Sciweavers

4340 search results - page 171 / 868
» Formal Methods and Cryptography
Sort
View
SIAMDM
2011
14 years 7 months ago
Counting Independent Sets Using the Bethe Approximation
Venkat Chandrasekaran, Misha Chertkov, David Gamar...
KI
2002
Springer
15 years 3 months ago
Formal Properties of Constraint Calculi for Qualitative Spatial Reasoning
In the previous two decades, a number of qualitative constraint calculi have been developed, which are used to represent and reason about spatial configurations. A common property...
Bernhard Nebel, Alexander Scivos
ICSE
1999
IEEE-ACM
15 years 8 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith
HICSS
2005
IEEE
151views Biometrics» more  HICSS 2005»
15 years 10 months ago
Inheritance in the Presence of Asynchronous Method Calls
— This paper considers a formal object-oriented model for distributed computing. Object orientation appears as a leading framework for concurrent and distributed systems. However...
Einar Broch Johnsen, Olaf Owe