Sciweavers

4340 search results - page 160 / 868
» Formal Methods and Cryptography
Sort
View
FMICS
2007
Springer
15 years 10 months ago
Machine Checked Formal Proof of a Scheduling Protocol for Smartcard Personalization
Using PVS (Prototype Verification System), we prove that an industry designed scheduler for a smartcard personalization machine is safe and optimal. This scheduler has previously ...
Leonard Lensink, Sjaak Smetsers, Marko C. J. D. va...
MKM
2007
Springer
15 years 10 months ago
Using Formal Concept Analysis in Mathematical Discovery
Formal concept analysis (FCA) comprises a set of powerful algorithms which can be used for data analysis and manipulation, and a set of visualisation tools which enable the discove...
Simon Colton, Daniel Wagner
LPNMR
2005
Springer
15 years 9 months ago
An ID-Logic Formalization of the Composition of Autonomous Databases
We introduce a declarative approach for a coherent composition of autonomous databases. For this we use ID-logic, a formalism that extends classical logic with inductive definitio...
Bert Van Nuffelen, Ofer Arieli, Alvaro Corté...
DSD
2002
IEEE
102views Hardware» more  DSD 2002»
15 years 9 months ago
Formal Verification of a DSP Chip Using an Iterative Approach
In this paper we describe a methodology for the formal verification of a DSP chip using the HOL theorem prover. We used an iterative method to specify both the behavioral and stru...
Ali Habibi, Sofiène Tahar, Adel Ghazel
WCRE
1999
IEEE
15 years 8 months ago
A Formal Approach for Reverse Engineering: A Case Study
As a program evolves, it becomes increasingly difficult to understand and reason about changes in the source code. Eventually, if enough changes are made, reverse engineering and ...
Gerald C. Gannod, Betty H. C. Cheng