Sciweavers

5255 search results - page 213 / 1051
» Formal Methods for Privacy
Sort
View
FORTE
2004
15 years 5 months ago
Formal Verification of Web Applications Modeled by Communicating Automata
In this paper, we present an approach for modeling an existing web application using communicating finite automata model based on the userdefined properties to be validated. We ela...
May Haydar, Alexandre Petrenko, Houari A. Sahraoui
ACL
1989
15 years 5 months ago
A Semantic-Head-Driven Generation Algorithm for Unification-Based Formalisms
We present an algorithm for generating strings from logical form encodings that improves upon previous algorithms in that it places fewer restrictions on the class of grammars to ...
Stuart M. Shieber, Gertjan van Noord, Robert C. Mo...
ENTCS
2006
145views more  ENTCS 2006»
15 years 4 months ago
Compositionality of Security Protocols: A Research Agenda
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the ver...
Cas J. F. Cremers
VMCAI
2005
Springer
15 years 9 months ago
An Overview of Semantics for the Validation of Numerical Programs
Interval computations, stochastic arithmetic, automatic differentiation, etc.: much work is currently done to estimate and to improve the numerical accuracy of programs but few c...
Matthieu Martel
FM
2003
Springer
88views Formal Methods» more  FM 2003»
15 years 9 months ago
Java Applet Correctness: A Developer-Oriented Approach
This paper presents experiments on formal validation of Java applets. It describes a tool that has been developed at the Gemplus Research Labs. This tool allows to formally prove J...
Lilian Burdy, Antoine Requet, Jean-Louis Lanet