Sciweavers

4340 search results - page 129 / 868
» Formal Methods and Cryptography
Sort
View
138
Voted
ASM
2010
ASM
15 years 6 months ago
Applying the B Method for the Rigorous Development of Smart Card Applications
Abstract. Smart Card applications usually require reliability and security to avoid incorrect operation or access violation in transactions and corruption or undue access to stored...
Bruno Emerson Gurgel Gomes, David Déharbe, ...
DANCE
2002
IEEE
15 years 9 months ago
Maude as a Wide-Spectrum Framework for Formal Modeling and Analysis of Active Networks
Modeling and formally analyzing active network systems and protocols is quite challenging, due to their highly dynamic nature and the need for new network models. We propose a wid...
José Meseguer, Peter Csaba Ölveczky, M...
145
Voted
SGAI
2009
Springer
15 years 8 months ago
A Linguistic Truth-Valued Temporal Reasoning Formalism and Its Implementation
Temporality and uncertainty are important features of many real world systems. Solving problems in such systems requires the use of formal mechanism such as logic systems, statisti...
Zhirui Lu, Jun Liu, Juan Carlos Augusto, Hui Wang
RSP
1999
IEEE
15 years 8 months ago
System Design Validation Using Formal Models
Formal methods are a nice idea, but the size and complexity of real systems means that they are impractical. We propose that a reasonable alternative to attempting to specify and ...
Peter Henderson, Robert John Walters
FASE
1999
Springer
15 years 8 months ago
JTN: A Java-Targeted Graphic Formal Notation for Reactive and Concurrent Systems
JTN is a formal graphic notation for Java-targeted design speci cations, that are speci cations of systems that will be implemented using Java. JTN is aimed to be a part of a more ...
Eva Coscia, Gianna Reggio