Sciweavers

1003 search results - page 56 / 201
» It's life Jim, but not as we know it!
Sort
View
FROCOS
2009
Springer
15 years 8 months ago
Improving Coq Propositional Reasoning Using a Lazy CNF Conversion Scheme
In an attempt to improve automation capabilities in the Coq proof assistant, we develop a tactic for the propositional fragment based on the DPLL procedure. Although formulas natur...
Stéphane Lescuyer, Sylvain Conchon
SP
2008
IEEE
195views Security Privacy» more  SP 2008»
15 years 7 months ago
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
We study formal security properties of a state-of-the-art protocol for secure file sharing on untrusted storage, in the automatic protocol verifier ProVerif. As far as we know, ...
Bruno Blanchet, Avik Chaudhuri
FGCN
2007
IEEE
106views Communications» more  FGCN 2007»
15 years 7 months ago
Discovering Methodology and Scenario to Detect Covert Database System
When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of th...
Gu Taek Lee, Seokhee Lee, Elena Tsomko, Sangjin Le...
GLOBECOM
2007
IEEE
15 years 7 months ago
Impact of Noisy Carrier Phase Synchronization on Linear Amplify-and-Forward Relaying
—We consider a distributed wireless network where amplify-and-forward relays assist the communication between multiple source/destination pairs. To provide a global phase referen...
Stefan Berger, Armin Wittneben
HAPTICS
2007
IEEE
15 years 7 months ago
Transparent Rendering of Tool Contact with Compliant Environments
Transparent haptic rendering of the contact between a tool and its environment requires very frequent update of the contact forces acting on the tool. Given a rigid tool and a def...
Miguel A. Otaduy, Markus H. Gross