Sciweavers

858 search results - page 139 / 172
» Formal Verification of Digital Systems
Sort
View
PAMI
2002
136views more  PAMI 2002»
15 years 1 months ago
On the Individuality of Fingerprints
Fingerprint identification is based on two basic premises: (i) persistence: the basic characteristics of fingerprints do not change with time; and (ii) individuality: the fingerpr...
Sharath Pankanti, Salil Prabhakar, Anil K. Jain
TOPLAS
2002
98views more  TOPLAS 2002»
15 years 1 months ago
Data abstraction and information hiding
traction and information hiding K. RUSTAN M. LEINO and GREG NELSON Compaq Systems Research Center er describes an approach for verifying programs in the presence of data abstractio...
K. Rustan M. Leino, Greg Nelson
ICWE
2010
Springer
15 years 12 days ago
Business Process Compliance through Reusable Units of Compliant Processes
Compliance management is essential for ensuring that organizational business processes and supporting information systems are in accordance with a set of prescribed requirements or...
David Schumm, Oktay Türetken, Natallia Kokash...
ENTCS
2010
103views more  ENTCS 2010»
14 years 11 months ago
Model Testing Asynchronously Communicating Objects using Modulo AC Rewriting
Testing and verification of asynchronously communicating objects in open environments are challenging due to non-determinism. We explore a formal approach for black-box testing by...
Olaf Owe, Martin Steffen, Arild B. Torjusen
TKDE
2008
177views more  TKDE 2008»
15 years 1 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...