Sciweavers

1633 search results - page 266 / 327
» On the Verification of Temporal Properties
Sort
View
IPAW
2010
14 years 9 months ago
Securing Provenance-Based Audits
Given the significant increase of on-line services that require personal information from users, the risk that such information is misused has become an important concern. In such ...
Rocío Aldeco-Pérez, Luc Moreau
REFSQ
2010
Springer
14 years 9 months ago
Towards a Framework for Specifying Software Robustness Requirements Based on Patterns
Abstract. [Context and motivation] With increasing use of software, quality attributes grow in relative importance. Robustness is a software quality attribute that has not received...
Ali Shahrokni, Robert Feldt
SOCIALCOM
2010
14 years 9 months ago
Finding Overlapping Communities in Social Networks
Increasingly, methods to identify community structure in networks have been proposed which allow groups to overlap. These methods have taken a variety of forms, resulting in a lack...
Mark K. Goldberg, Stephen Kelley, Malik Magdon-Ism...
ICST
2009
IEEE
14 years 9 months ago
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking
Bounded model checking--as well as symbolic equivalence checking--are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC ha...
Hendrik Post, Carsten Sinz
CDC
2010
IEEE
141views Control Systems» more  CDC 2010»
14 years 6 months ago
Using computer games for hybrid systems controller synthesis
Abstract-- We propose a formal method for feedback controller synthesis using interactive computer programs with graphical interface (in short, computer games). The main theoretica...
A. Agung Julius, Sina Afshari