Sciweavers

5255 search results - page 230 / 1051
» Formal Methods for Privacy
Sort
View
CCS
2009
ACM
15 years 8 months ago
On voting machine design for verification and testability
We present an approach for the design and analysis of an electronic voting machine based on a novel combination of formal verification and systematic testing. The system was desig...
Cynthia Sturton, Susmit Jha, Sanjit A. Seshia, Dav...
ESORICS
2006
Springer
15 years 7 months ago
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems
IDS research still needs to strengthen mathematical foundations and theoretic guidelines. In this paper, we build a formal framework, based on information theory, for analyzing and...
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, ...
SIGIR
2004
ACM
15 years 9 months ago
A formal study of information retrieval heuristics
Empirical studies of information retrieval methods show that good retrieval performance is closely related to the use of various retrieval heuristics, such as TF-IDF weighting. On...
Hui Fang, Tao Tao, ChengXiang Zhai
ZUM
2005
Springer
140views Formal Methods» more  ZUM 2005»
15 years 9 months ago
An Object-Oriented Structuring for Z Based on Views
There is significant interest in the use of Z in conjunction with object-orientation. Here we present a new approach to structuring Z specifications in an object-oriented (OO) st...
Nuno Amálio, Fiona Polack, Susan Stepney
FMCAD
2000
Springer
15 years 7 months ago
Do You Trust Your Model Checker?
Abstract. In this paper we describe the formal specification and verification of the efficient algorithm for real-time model checking implemented in the model checker RAVEN. It was...
Wolfgang Reif, Jürgen Ruf, Gerhard Schellhorn...