Sciweavers

297 search results - page 51 / 60
» Formal Analysis of a Non-Repudiation Protocol
Sort
View
LATINCRYPT
2010
14 years 10 months ago
Mediated Traceable Anonymous Encryption
the full version of the extended abstract which appears in Latincrypt '10 (august 8-11, 2010, Puebla, Mexico) M. Abdalla and P. Barreto Eds., Springer-Verlag, LNCS 6212, pages...
Malika Izabachène, David Pointcheval, Damie...
DAC
2005
ACM
16 years 20 days ago
IODINE: a tool to automatically infer dynamic invariants for hardware designs
We describe IODINE, a tool to automatically extract likely design properties using dynamic analysis. A practical bottleneck in the formal verification of hardware designs is the n...
Sudheendra Hangal, Naveen Chandra, Sridhar Narayan...
VLSID
2002
IEEE
152views VLSI» more  VLSID 2002»
16 years 2 days ago
Verification of an Industrial CC-NUMA Server
Directed test program-based verification or formal verification methods are usually quite ineffective on large cachecoherent, non-uniform memory access (CC-NUMA) multiprocessors b...
Rajarshi Mukherjee, Yozo Nakayama, Toshiya Mima
CONEXT
2006
ACM
15 years 5 months ago
Compositional control of IP media
Abstract— In many IP media services, the media channels are point-to-point, dynamic, and set up with the participation of one or more application servers, even though the media p...
Pamela Zave, Eric Cheung
AIL
2004
85views more  AIL 2004»
14 years 11 months ago
Normative autonomy and normative co-ordination: Declarative power, representation, and mandate
In this paper we provide a formal analysis of the idea of normative co-ordination. We argue that this idea is based on the assumption that agents can achieve flexible co-ordination...
Jonathan Gelati, Antonino Rotolo, Giovanni Sartor,...