Sciweavers

5255 search results - page 376 / 1051
» Formal Methods for Privacy
Sort
View
130
Voted
AFP
2004
Springer
117views Formal Methods» more  AFP 2004»
15 years 10 months ago
Refactoring Functional Programs
Abstract. Refactoring is the process of improving the design of existing programs without changing their functionality. These notes cover refactoring in functional languages, using...
Simon Thompson
FM
2003
Springer
136views Formal Methods» more  FM 2003»
15 years 10 months ago
Improving Safety Assessment of Complex Systems: An Industrial Case Study
The complexity of embedded controllers is steadily increasing. This trend, stimulated by the continuous improvement of the computational power of hardware, demands for a correspond...
Marco Bozzano, Antonella Cavallo, Massimo Cifaldi,...
DATE
1999
IEEE
134views Hardware» more  DATE 1999»
15 years 9 months ago
Verifying Imprecisely Working Arithmetic Circuits
If real number calculations are implemented as circuits, only a limited preciseness can be obtained. Hence, formal verification can not be used to prove the equivalence between th...
Michaela Huhn, Klaus Schneider, Thomas Kropf, Geor...
156
Voted
FORTEST
2008
15 years 6 months ago
Testing Data Types Implementations from Algebraic Specifications
Algebraic specifications of data types provide a natural basis for testing data types implementations. In this framework, the conformance relation is based on the satisfaction of a...
Marie-Claude Gaudel, Pascale Le Gall
166
Voted
ESOP
2005
Springer
15 years 10 months ago
Analysis of an Electronic Voting Protocol in the Applied Pi Calculus
Electronic voting promises the possibility of a convenient, efficient and secure facility for recording and tallying votes in an election. Recently highlighted inadequacies of imp...
Steve Kremer, Mark Ryan