Sciweavers

5255 search results - page 318 / 1051
» Formal Methods for Privacy
Sort
View
MEMOCODE
2008
IEEE
15 years 11 months ago
High-throughput Pipelined Mergesort
Abstract: We present an implementation of a highthroughput cryptosorter, capable of sorting an encrypted database of eight megabytes in .15 seconds; 1102 times faster than a softwa...
Kermin Fleming, Myron King, Man Cheuk Ng, Asif Kha...
SAS
2005
Springer
127views Formal Methods» more  SAS 2005»
15 years 10 months ago
Banshee: A Scalable Constraint-Based Analysis Toolkit
Abstract. We introduce Banshee, a toolkit for constructing constraintbased analyses. Banshee’s novel features include a code generator for creating customized constraint resoluti...
John Kodumal, Alexander Aiken
ZUM
2005
Springer
134views Formal Methods» more  ZUM 2005»
15 years 10 months ago
Requirements as Conjectures: Intuitive DVD Menu Navigation
In this paper we use Z to capture the requirements for an ‘intuitive’ menu navigation system as a series of conjectures that should hold. We use those requirements to investiga...
Jemima Rossmorris, Susan Stepney
ZUM
2005
Springer
206views Formal Methods» more  ZUM 2005»
15 years 10 months ago
Component Reuse in B Using ACL2
Abstract. We present a new methodology that permits to reuse an existing hardware component that has not been developed within the B framework while maintaining a correct design ...
Yann Zimmermann, Diana Toma
IPPS
2002
IEEE
15 years 9 months ago
Proving Self-Stabilization with a Proof Assistant
We present a formalization of a proof of self-stabilization in the Coq proof assistant. Coq is a program allowing to define mathematical objects and properties, and to make proof...
Pierre Courtieu