Sciweavers

1833 search results - page 19 / 367
» Mechanized Verification with Sharing
Sort
View
POPL
2007
ACM
16 years 29 days ago
Towards a mechanized metatheory of standard ML
We present an internal language with equivalent expressive power to Standard ML, and discuss its formalization in LF and the machine-checked verification of its type safety in Twe...
Daniel K. Lee, Karl Crary, Robert Harper
71
Voted
SP
2000
IEEE
15 years 5 months ago
Using Conservation of Flow as a Security Mechanism in Network Protocols
The law of Conservation of Flow, which states that an input must either be absorbed or sent on as an output (possibly with modification), is an attractive tool with which to analy...
John R. Hughes, Tuomas Aura, Matt Bishop
AAAI
1990
15 years 1 months ago
Mechanizing Inductive Reasoning
Automating proofs by induction is important in many computer science and artificial intelligence applications, in particular in program verification and specification systems. We ...
Emmanuel Kounalis, Michaël Rusinowitch
101
Voted
CIAC
2010
Springer
275views Algorithms» more  CIAC 2010»
15 years 10 months ago
Online Cooperative Cost Sharing
The problem of sharing the cost of a common infrastructure among a set of strategic and cooperating players has been the subject of intensive research in recent years. However, mos...
Janina Brenner and Guido Schaefer
103
Voted
ICC
2007
IEEE
139views Communications» more  ICC 2007»
15 years 4 months ago
Comparison of Protection Mechanisms: Capacity Efficiency and Recovery Time
High efficiency in capacity utilization and fast restoration are two primary goals of survivable design in optical networks. Shared backup path protection has been shown to be effi...
Wensheng He, Arun K. Somani