Sciweavers

4036 search results - page 763 / 808
» Formal Methods
Sort
View
EMSOFT
2007
Springer
15 years 3 months ago
Verification of device drivers and intelligent controllers: a case study
The soundness of device drivers generally cannot be verified in isolation, but has to take into account the reactions of the hardware devices. In critical embedded systems, interf...
David Monniaux
SIGMETRICS
1997
ACM
112views Hardware» more  SIGMETRICS 1997»
15 years 3 months ago
Group-Guaranteed Channel Capacity in Multimedia Storage Servers
One of the open questions in the design of multimedia storage servers is in what order to serve incoming requests. Given the capability provided by the disk layout and scheduling ...
Athanassios Tsiolis, Mary K. Vernon
SIGLEX
1991
15 years 3 months ago
Presuppositions and Default Reasoning: A Study in Lexical Pragmatics
Explaining how the meaning of words relate to the meaning of the utterance in which they are used is of utmost importance. The most common approaches view the meaning of an uttera...
Robert E. Mercer
CCS
2008
ACM
15 years 1 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
CIKM
2007
Springer
15 years 1 months ago
Proximity-based document representation for named entity retrieval
One aspect in which retrieving named entities is different from retrieving documents is that the items to be retrieved – persons, locations, organizations – are only indirect...
Desislava Petkova, W. Bruce Croft