Sciweavers

4340 search results - page 59 / 868
» Formal Methods and Cryptography
Sort
View
VLSID
2005
IEEE
127views VLSI» more  VLSID 2005»
15 years 9 months ago
Formal Methods for Analyzing the Completeness of an Assertion Suite against a High-Level Fault Model
One of the emerging challenges in formal property verification (FPV) technology is the problem of deciding whether sufficient properties have been written to cover the design in...
Sayantan Das, Ansuman Banerjee, Prasenjit Basu, Pa...
122
Voted
FM
2009
Springer
124views Formal Methods» more  FM 2009»
15 years 10 months ago
An Incremental Approach to Scope-Bounded Checking Using a Lightweight Formal Method
We present a novel approach to optimize scope-bounded checking programs using a relational constraint solver. Given a program and its correctness specification, the traditional app...
Danhua Shao, Sarfraz Khurshid, Dewayne E. Perry
135
Voted
ITS
2004
Springer
123views Multimedia» more  ITS 2004»
15 years 9 months ago
Combining Heuristics and Formal Methods in a Tool for Supporting Simulation-Based Discovery Learning
Abstract. This paper describes the design of a tool to support learners in simulation-based discovery learning environments. The design redesigns and extents a previous tool to ove...
Koen Veermans, Wouter R. van Joolingen
133
Voted
TLCA
2005
Springer
15 years 9 months ago
Privacy in Data Mining Using Formal Methods
There is growing public concern about personal data collected by both private and public sectors. People have very little control over what kinds of data are stored and how such da...
Stan Matwin, Amy P. Felty, István T. Hern&a...
135
Voted
ICIW
2007
IEEE
15 years 9 months ago
Web Service Composition Approaches: From Industrial Standards to Formal Methods
Abstract— Composition of web services is much studied to support business-to-business and enterprise application integration in e-Commerce. Current web service composition approa...
Maurice H. ter Beek, Antonio Bucchiarone, Stefania...