Sciweavers

5255 search results - page 285 / 1051
» Formal Methods for Privacy
Sort
View
IJCM
2007
53views more  IJCM 2007»
15 years 4 months ago
Splitting methods for non-autonomous linear systems
We present splitting methods for numerically solving a certain class of explicitly time-dependent linear differential equations. Starting from an efficient method for the autonom...
Sergio Blanes, Fernando Casas, Ander Murua
IJDE
2007
105views more  IJDE 2007»
15 years 4 months ago
Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method
Inconsistencies in various data structures, such as missing log records and modified operating system files, have long been used by intrusion investigators and forensic analysts a...
Pavel Gladyshev, Andreas Enbacka
CAV
2009
Springer
150views Hardware» more  CAV 2009»
16 years 5 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
HICSS
2005
IEEE
152views Biometrics» more  HICSS 2005»
15 years 10 months ago
Knowledge Ontology: A Method for Empirical Identification of 'As-Is' Contextual Knowledge
In this paper, we consider existing approaches to ontology definition and validation. Popular techniques include the use of domain experts or reliance on formal logic. We consider...
Theresa Edgington, T. S. Raghu, Ajay S. Vinze
HASE
2007
IEEE
15 years 8 months ago
Multiple Pre/Post Specifications for Heap-Manipulating Methods
Automated verification plays an important role for high assurance software. This typically uses a pair of pre/post conditions as a formal (but possibly partial) specification of e...
Wei-Ngan Chin, Cristina David, Huu Hai Nguyen, She...