Sciweavers

4340 search results - page 210 / 868
» Formal Methods and Cryptography
Sort
View
IJDE
2007
105views more  IJDE 2007»
15 years 4 months ago
Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method
Inconsistencies in various data structures, such as missing log records and modified operating system files, have long been used by intrusion investigators and forensic analysts a...
Pavel Gladyshev, Andreas Enbacka
CAV
2009
Springer
150views Hardware» more  CAV 2009»
16 years 5 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
HICSS
2005
IEEE
152views Biometrics» more  HICSS 2005»
15 years 10 months ago
Knowledge Ontology: A Method for Empirical Identification of 'As-Is' Contextual Knowledge
In this paper, we consider existing approaches to ontology definition and validation. Popular techniques include the use of domain experts or reliance on formal logic. We consider...
Theresa Edgington, T. S. Raghu, Ajay S. Vinze
124
Voted
HASE
2007
IEEE
15 years 8 months ago
Multiple Pre/Post Specifications for Heap-Manipulating Methods
Automated verification plays an important role for high assurance software. This typically uses a pair of pre/post conditions as a formal (but possibly partial) specification of e...
Wei-Ngan Chin, Cristina David, Huu Hai Nguyen, She...
BCSHCI
2008
15 years 6 months ago
Research methods for HCI
The aim of the tutorial is to help researchers, particularly early career researchers, to develop the appropriate skills to make a useful research contribution to Human-Computer I...
Anna Louise Cox, Paul A. Cairns, Harold W. Thimble...