Sciweavers

597 search results - page 104 / 120
» E-Process Design and Assurance Using Model Checking
Sort
View
MMMACNS
2001
Springer
15 years 2 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
ISCI
2008
86views more  ISCI 2008»
14 years 10 months ago
New (t, n) threshold directed signature scheme with provable security
Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can v...
Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, X...
DAC
1998
ACM
15 years 2 months ago
OCCOM: Efficient Computation of Observability-Based Code Coverage Metrics for Functional Verification
—Functional simulation is still the primary workhorse for verifying the functional correctness of hardware designs. Functional verification is necessarily incomplete because it i...
Farzan Fallah, Srinivas Devadas, Kurt Keutzer
CIIT
2004
104views Communications» more  CIIT 2004»
14 years 11 months ago
Semi-automatic compensation of the propagation delay in fault-tolerant systems
In control systems the jitter is a major problem since in a time-varying system the theoretical results for analysis and design of time-invariant systems cannot be used directly. ...
Thomas Losert, Wilfried Elmenreich, Martin Schlage...
PEWASUN
2007
ACM
14 years 11 months ago
Worst-case lifetime computation of a wireless sensor network by model-checking
Wireless Sensor Network (WSN) technology is now mature enough to be used in numerous application domains. However, due to the restricted amount of energy usually allocated to each...
Laurent Mounier, Ludovic Samper, Wassim Znaidi