Sciweavers

564 search results - page 47 / 113
» Do interactive systems need specifications
Sort
View
ACSAC
2004
IEEE
15 years 8 months ago
Open-Source Applications of TCPA Hardware
How can Alice trust computation occurring at Bob's computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. Whe...
John Marchesini, Sean W. Smith, Omen Wild, Joshua ...
ICSE
2000
IEEE-ACM
15 years 7 months ago
An inheritance-based technique for building simulation proofs incrementally
This paper presents a technique for incrementally constructing safety specifications, abstract algorithm descriptions, and simulation proofs showing that algorithms meet their spe...
Idit Keidar, Roger Khazan, Nancy A. Lynch, Alexand...
ESOP
2008
Springer
15 years 6 months ago
Just Forget It - The Semantics and Enforcement of Information Erasure
Abstract. There are many settings in which sensitive information is made available to a system or organisation for a specific purpose, on the understanding that it will be erased o...
Sebastian Hunt, David Sands
FLAIRS
2006
15 years 5 months ago
Learning Personalized Query Modifications
The continuous development of the Internet has resulted in an exponential increase in the amount of available information. A popular way to access this information is by submittin...
Erika E. Torres-Verdín, Manfred Huber
ATVA
2009
Springer
97views Hardware» more  ATVA 2009»
15 years 5 months ago
Memory Usage Verification Using Hip/Sleek
Embedded systems often come with constrained memory footprints. It is therefore essential to ensure that software running on such platforms fulfils memory usage specifications at c...
Guanhua He, Shengchao Qin, Chenguang Luo, Wei-Ngan...