Sciweavers

1633 search results - page 311 / 327
» On the Verification of Temporal Properties
Sort
View
113
Voted
JCS
2006
157views more  JCS 2006»
15 years 1 months ago
Analysis of probabilistic contract signing
We present three case studies, investigating the use of probabilistic model checking to automatically analyse properties of probabilistic contract signing protocols. We use the pr...
Gethin Norman, Vitaly Shmatikov
110
Voted
COMPSEC
2004
131views more  COMPSEC 2004»
15 years 1 months ago
Biometric random number generators
Abstract Up to now biometric methods have been used in cryptography for authentication purposes. In this paper we propose to use biological data for generating sequences of random ...
Janusz Szczepanski, Elek Wajnryb, José M. A...
141
Voted
SIES
2010
IEEE
14 years 11 months ago
A Comparison of Linux CAN Drivers and their Applications
The aim of this paper is to introduce LinCAN, a CAN driver system for Linux, developed at the Department of Control Engineering of the Czech Technical University in Prague, and to ...
Michal Sojka, Pavel Pisa, Martin Petera, Ondrej Sp...
137
Voted
TACAS
2010
Springer
170views Algorithms» more  TACAS 2010»
14 years 11 months ago
SLAB: A Certifying Model Checker for Infinite-State Concurrent Systems
Systems and protocols combining concurrency and infinite state space occur quite often in practice, but are very difficult to verify automatically. At the same time, if the system ...
Klaus Dräger, Andrey Kupriyanov, Bernd Finkbe...
156
Voted
CORR
2009
Springer
242views Education» more  CORR 2009»
14 years 11 months ago
Adaptive Scheduling of Data Paths using Uppaal Tiga
Abstract. We apply Uppaal Tiga to automatically compute adaptive scheduling strategies for an industrial case study dealing with a state-of-the-art image processing pipeline of a p...
Israa AlAttili, Fred Houben, Georgeta Igna, Steffe...