Sciweavers

2607 search results - page 79 / 522
» On the Architecture of System Verification Environments
Sort
View
CADE
2008
Springer
16 years 5 days ago
Certifying a Tree Automata Completion Checker
Tree automata completion is a technique for the verification of infinite state systems. It has already been used for the verification of cryptographic protocols and the prototyping...
Benoît Boyer, Thomas Genet, Thomas P. Jensen
APSCC
2006
IEEE
15 years 1 months ago
GHIDS: Defending Computational Grids against Misusing of Shared Resources
Detecting intrusions at host level is vital to protecting shared resources in grid, but traditional Host-based Intrusion Detecting System (HIDS) is not suitable for grid environme...
Guofu Feng, Xiaoshe Dong, Weizhe Liu, Ying Chu, Ju...
CACM
2010
97views more  CACM 2010»
14 years 9 months ago
Certified software
Certified software consists of a machine-executable program plus a formal machine-checkable proof that the software is free of bugs with respect to a claim of dependability. The c...
Zhong Shao
HPCS
2002
IEEE
15 years 4 months ago
CoStore: A Reliable and Highly Available Storage System Using Clusters
The CoStore cluster architecture has been proposed to construct a reliable and highly available storage system. A prototype CoStore has been implemented and its performance has be...
Yong Chen, Lionel M. Ni, Cheng-Zhong Xu, Mingyao Y...
VRST
2006
ACM
15 years 5 months ago
Sceptre: an infrared laser tracking system for virtual environments
In this paper a 3D tracking system for Virtual Environments is presented which utilizes infrared (IR) laser technology. Invisible laser patterns are projected from the user(s) to ...
Christian Wienss, Igor N. Nikitin, Gernot Goebbels...