Sciweavers

1054 search results - page 183 / 211
» From a Verified Kernel towards Verified Systems
Sort
View
USS
2010
14 years 9 months ago
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy
On November 3, 2009, voters in Takoma Park, Maryland, cast ballots for mayor and city council members using the ScantegrityII voting system--the first time any end-to-end (e2e) vo...
Richard Carback, David Chaum, Jeremy Clark, John C...
EUROSYS
2009
ACM
15 years 9 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ conļ¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
ICDT
2009
ACM
248views Database» more  ICDT 2009»
16 years 15 days ago
Automatic verification of data-centric business processes
We formalize and study business process systems that are centered around "business artifacts", or simply "artifacts". This approach focuses on data records, kn...
Alin Deutsch, Richard Hull, Fabio Patrizi, Victor ...
POPL
2008
ACM
16 years 3 days ago
Cyclic proofs of program termination in separation logic
We propose a novel approach to proving the termination of heapmanipulating programs, which combines separation logic with cyclic proof within a Hoare-style proof system. Judgement...
James Brotherston, Richard Bornat, Cristiano Calca...
SMC
2007
IEEE
102views Control Systems» more  SMC 2007»
15 years 6 months ago
TagFree: Identifying users without tags in smart home environments
— Since family members have their unique features when living in a smart home environment, user identifications are able to achieve without any tags. In this paper, we propose T...
Wen-Chih Peng, Wangling Huang, YiLing Chen, PeiChi...