Sciweavers

5255 search results - page 289 / 1051
» Formal Methods for Privacy
Sort
View
TLDI
2009
ACM
140views Formal Methods» more  TLDI 2009»
16 years 1 months ago
Design patterns in separation logic
Object-oriented programs are notable for making use of both rder abstractions and mutable, aliased state. Either feature alone is challenging for formal verification, and the com...
Neelakantan R. Krishnaswami, Jonathan Aldrich, Lar...
162
Voted
IFM
2009
Springer
158views Formal Methods» more  IFM 2009»
15 years 11 months ago
Developing Topology Discovery in Event-B
Abstract. We present a formal development in Event-B of a distributed topology discovery algorithm. Distributed topology discovery is at the core of several routing algorithms and ...
Thai Son Hoang, Hironobu Kuruma, David A. Basin, J...
135
Voted
FDL
2003
IEEE
15 years 9 months ago
Using Symbolic Simulation for Bounded Property Checking
Assuring correctness of digital designs is one of the major tasks in the system design flow. Formal methods have been proposed to accompany commonly used simulation approaches. I...
Jürgen Ruf, Prakash Mohan Peranandam, Thomas ...
IFM
2000
Springer
15 years 8 months ago
ISpec: Towards Practical and Sound Interface Specifications
Abstract. This paper introduces the ISpec approach to interface specification. ISpec supports the development of interface specifications at various levels of formality and detail ...
H. B. M. Jonkers
171
Voted
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
15 years 8 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...