Sciweavers

624 search results - page 99 / 125
» Application of Lightweight Formal Methods to Software Securi...
Sort
View
WPES
2006
ACM
15 years 5 months ago
Measuring relationship anonymity in mix networks
Many applications of mix networks such as anonymous Web browsing require relationship anonymity: it should be hard for the attacker to determine who is communicating with whom. Co...
Vitaly Shmatikov, Ming-Hsiu Wang
EUROSYS
2008
ACM
15 years 9 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
CAV
2007
Springer
116views Hardware» more  CAV 2007»
15 years 6 months ago
A Decision Procedure for Bit-Vectors and Arrays
Abstract. STP is a decision procedure for the satisfiability of quantifier-free formulas in the theory of bit-vectors and arrays that has been optimized for large problems encoun...
Vijay Ganesh, David L. Dill
ISOLA
2004
Springer
15 years 5 months ago
EZPetri: A Petri net interchange framework for Eclipse based on PNML
Petri net community has suffered with the lack of a standard format to represent Petri net models. This situation led to an undesirable tool incompatibility. In order to solve thi...
Gabriel Alves, Adilson Arcoverde, Ricardo Massa Fe...
ISCAS
2008
IEEE
119views Hardware» more  ISCAS 2008»
15 years 6 months ago
Adjusting the neurons models in neuromimetic ICs using the voltage-clamp technique
— This paper presents an original method to tune a neuromimetic IC based on neuron conductance-based models (Hodgkin-Huxley formalism). This method is well known in electrophysio...
Sylvain Saïghi, Laure Buhry, Yannick Bornat, ...