Sciweavers

4340 search results - page 117 / 868
» Formal Methods and Cryptography
Sort
View
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
15 years 10 months ago
From Weak to Strong Watermarking
The informal goal of a watermarking scheme is to “mark” a digital object, such as a picture or video, in such a way that it is difficult for an adversary to remove the mark wit...
Nicholas Hopper, David Molnar, David Wagner
133
Voted
JOC
2007
169views more  JOC 2007»
15 years 3 months ago
Another Look at "Provable Security"
We give an informal analysis and critique of several typical “provable security” results. In some cases there are intuitive but convincing arguments for rejecting the conclusi...
Neal Koblitz, Alfred Menezes
FMAM
2010
223views Formal Methods» more  FMAM 2010»
15 years 1 months ago
Agile Formality: A Mole of Software Engineering Practices
: Members of the agile programming and formal methods communities do not always see eye-to-eye. These two communities often do not talk to or learn from each other. Only recently, ...
Vieri del Bianco, Dragan Stosic, Joseph R. Kiniry
WCRE
2009
IEEE
15 years 10 months ago
Domain Feature Model Recovery from Multiple Applications Using Data Access Semantics and Formal Concept Analysis
Feature models are widely employed in domainspecific software development to specify the domain requirements with commonality and variability. A feature model is usually construct...
Yiming Yang, Xin Peng, Wenyun Zhao
130
Voted
SBCCI
2004
ACM
127views VLSI» more  SBCCI 2004»
15 years 9 months ago
A formal software synthesis approach for embedded hard real-time systems
Software synthesis is defined as the task of translating a specification into a software program, in a general purpose language, in such a way that this software can be compiled...
Raimundo S. Barreto, Marília Neves, Meuse N...