Sciweavers

5255 search results - page 391 / 1051
» Formal Methods for Privacy
Sort
View
FM
2001
Springer
142views Formal Methods» more  FM 2001»
15 years 9 months ago
Model-Checking over Multi-valued Logics
Classical logic cannot be used to effectively reason about systems with uncertainty (lack of essential information) or inconsistency (contradictory information often occurring when...
Marsha Chechik, Steve M. Easterbrook, Victor Petro...
FM
2001
Springer
99views Formal Methods» more  FM 2001»
15 years 9 months ago
Transacted Memory for Smart Cards
Transacted Memory offers persistence, undoability and auditing. We present a Java/JML Reference Model of the Transacted Memory system on the basis of our earlier separate Z model...
Pieter H. Hartel, Michael J. Butler, Eduard de Jon...
IFL
2001
Springer
15 years 9 months ago
A Polynomial-Cost Non-determinism Analysis
Abstract. This paper is an extension of a previous work where two nondeterminism analyses were presented. One of them was efficient but not very powerful and the other one was more...
Ricardo Pena, Clara Segura
FM
1999
Springer
126views Formal Methods» more  FM 1999»
15 years 9 months ago
Correctness Proof of the Standardized Algorithm for ABR Conformance
Conformance control for ATM cells is based on a real-time reactive algorithm which delivers a value depending on inputs from the network. This value must always agree with a well d...
Jean-François Monin, Francis Klay
ECRTS
1998
IEEE
15 years 9 months ago
Tool-supported hierarchical design of distributed real-time systems
In this paper we demonstrate the usage of a formal description technique for real-time systems called PLCAutomaton [4] by applying this method to a real-world case study. To this ...
Henning Dierks, Josef Tapken