Sciweavers

307 search results - page 53 / 62
» Causality and the Semantics of Provenance
Sort
View
104
Voted
PKC
1998
Springer
107views Cryptology» more  PKC 1998»
15 years 2 months ago
On the Security of ElGamal Based Encryption
The ElGamal encryption scheme has been proposed several years ago and is one of the few probabilistic encryption schemes. However, its security has never been concretely proven bas...
Yiannis Tsiounis, Moti Yung
DEBS
2010
ACM
15 years 2 months ago
Logic-based representation, reasoning and machine learning for event recognition
Today’s organisations require techniques for automated transformation of the large data volumes they collect during their operations into operational knowledge. This requirement...
Alexander Artikis, Georgios Paliouras, Franç...
ESOP
2006
Springer
15 years 1 months ago
ILC: A Foundation for Automated Reasoning About Pointer Programs
This paper presents a new program logic designed for facilitating automated reasoning about pointer programs. The program logic is directly inspired by previous work by O'Hea...
Limin Jia, David Walker
REX
1991
15 years 1 months ago
From Timed to Hybrid Systems
We propose a framework for the formal speci cation and veri cation of timed and hybrid systems. For timed systems we propose a speci cation language that refers to time only throug...
Oded Maler, Zohar Manna, Amir Pnueli
87
Voted
ATVA
2009
Springer
97views Hardware» more  ATVA 2009»
14 years 11 months ago
Memory Usage Verification Using Hip/Sleek
Embedded systems often come with constrained memory footprints. It is therefore essential to ensure that software running on such platforms fulfils memory usage specifications at c...
Guanhua He, Shengchao Qin, Chenguang Luo, Wei-Ngan...