Sciweavers

2468 search results - page 61 / 494
» On Model Checking Techniques for Randomized Distributed Syst...
Sort
View
ASE
2005
102views more  ASE 2005»
15 years 3 months ago
Modular Verification of Open Features Using Three-Valued Model Checking
Feature-oriented programming organizes programs around features rather than objects, thus better supporting extensible, product-line architectures. Programming languages increasin...
Harry C. Li, Shriram Krishnamurthi, Kathi Fisler
135
Voted
ICCSA
2003
Springer
15 years 8 months ago
Camera Models and Optical Systems Used in Computer Graphics: Part II, Image-Based Techniques
Abstract. In our companion paper [5], we described the optics underlying camera models that have been used in computer graphics, and presented object space techniques for rendering...
Brian A. Barsky, Daniel R. Horn, Stanley A. Klein,...
CAV
2007
Springer
108views Hardware» more  CAV 2007»
15 years 9 months ago
Systematic Acceleration in Regular Model Checking
Abstract. Regular model checking is a form of symbolic model checking technique for systems whose states can be represented as finite words over a finite alphabet, where regular ...
Bengt Jonsson, Mayank Saksena
CRYPTO
2001
Springer
152views Cryptology» more  CRYPTO 2001»
15 years 7 months ago
Secure Distributed Linear Algebra in a Constant Number of Rounds
Consider a network of processors among which elements in a finite field K can be verifiably shared in a constant number of rounds. Assume furthermore constant-round protocols ar...
Ronald Cramer, Ivan Damgård
142
Voted
COMCOM
2002
189views more  COMCOM 2002»
15 years 3 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt