Sciweavers

5255 search results - page 157 / 1051
» Formal Methods for Privacy
Sort
View
124
Voted
ENTCS
2007
113views more  ENTCS 2007»
15 years 3 months ago
A Formalization of Strong Normalization for Simply-Typed Lambda-Calculus and System F
We formalize in the logical framework ATS/LF a proof based on Tait’s method that establishes the simply-typed lambda-calculus being strongly normalizing. In malization, we emplo...
Kevin Donnelly, Hongwei Xi
PROFES
2004
Springer
15 years 9 months ago
Development of a Normative Package for Safety-Critical Software Using Formal Regulatory Requirements
Abstract. The important tasks in requirement engineering are resolving requirements inconsistencies between regulators and developers of safety-critical computer systems, and the v...
Sergiy A. Vilkomir, Aditya K. Ghose
141
Voted
MIE
2008
150views Healthcare» more  MIE 2008»
15 years 5 months ago
Mining for Adverse Drug Events with Formal Concept Analysis
: The pharmacovigilance databases consist of several case reports involving drugs and adverse events (AEs). Some methods are applied consistently to highlight all signals, i.e. all...
Alexander Estacio-Moreno, Yannick Toussaint, C&eac...
141
Voted
EUROCAST
2005
Springer
104views Hardware» more  EUROCAST 2005»
15 years 9 months ago
A Mathematical Formalism for the Evaluation of C-Space for Redundant Robots
Abstract. This paper presents a new general method for obstacle representation in the configuration space (C-space) for redundant robots. The method is based on the analytical dec...
Roberto Therón, Vidal Moreno, Belén ...
133
Voted
CHES
2006
Springer
146views Cryptology» more  CHES 2006»
15 years 7 months ago
Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits
This paper presents a Path Swapping (PS) method which enables to enhance the security of Quasi Delay Insensitive Asynchronous Circuits against Power Analysis (PA) attack. This appr...
G. Fraidy Bouesse, Gilles Sicard, Marc Renaudin