Sciweavers

5255 search results - page 389 / 1051
» Formal Methods for Privacy
Sort
View
FORMATS
2009
Springer
15 years 11 months ago
Analyzing Real-Time Event-Driven Programs
Embedded real-time systems are typically programmed in low-level languages which provide support for event-driven task processing and real-time interrupts. We show that the model c...
Pierre Ganty, Rupak Majumdar
IEEEIAS
2008
IEEE
15 years 11 months ago
Abusing SIP Authentication
The recent and massive deployment of Voice over IP infrastructures had raised the importance of the VoIP security and more precisely of the underlying signalisation protocol SIP. ...
Humberto J. Abdelnur, Tigran Avanesov, Michaë...
164
Voted
MEMOCODE
2008
IEEE
15 years 11 months ago
MEMOCODE 2008 Co-Design Contest
The second MEMOCODE hardware/software codesign contest invites participants to solve a practical hardware/software codesign problem within the time span of one month. The larger o...
Patrick Schaumont, Krste Asanovic, James C. Hoe
SAS
2007
Springer
15 years 11 months ago
Semantics-Based Transformation of Arithmetic Expressions
Floating-point arithmetic is an important source of errors in programs because of the loss of precision arising during a computation. Unfortunately, this arithmetic is not intuitiv...
Matthieu Martel
149
Voted
SAS
2007
Springer
15 years 11 months ago
Modular Safety Checking for Fine-Grained Concurrency
Concurrent programs are difficult to verify because the proof must consider the interactions between the threads. Fine-grained concurrency and heap allocated data structures exacer...
Cristiano Calcagno, Matthew J. Parkinson, Viktor V...