Sciweavers

319 search results - page 26 / 64
» Formally Verifying Dynamic Properties of Knowledge Based Sys...
Sort
View
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
14 years 10 months ago
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
e an abstraction of zero-knowledge protocols that is le to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using a novel equational theor...
Michael Backes, Matteo Maffei, Dominique Unruh
WWW
2003
ACM
16 years 12 days ago
A system for principled matchmaking in an electronic marketplace
More and more resources are becoming available on the Web, and there is a growing need for infrastructures that, based on advertised descriptions, are able to semantically match d...
Tommaso Di Noia, Eugenio Di Sciascio, Francesco M....
AIPS
2006
15 years 1 months ago
Knowledge-based Middleware as an Architecture for Planning and Scheduling Systems
We present an architecture that provides a robust, scalable and flexible software framework for planning and scheduling systems through the use of standardized industrial-strength...
Bernd Schattenberg, Steffen Balzer, Susanne Biundo
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 3 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
HASE
1998
IEEE
15 years 4 months ago
Formal Specification in Collaborative Design of Critical Software Tools
Engineers use software tools to analyze designs for critical systems. Because important decisions are based on tool results, tools must provide valid modeling constructs; engineer...
David Coppit, Kevin J. Sullivan