Sciweavers

480 search results - page 38 / 96
» On the verification of automotive protocols
Sort
View
CCS
2006
ACM
15 years 1 months ago
Certified mailing lists
Email List Services (or simply, mailing lists) are becoming increasingly common for collaborative computing. In order to enable their use for official purposes with increased effe...
Himanshu Khurana, Hyung-Seok Hahm
ASIAN
2009
Springer
334views Algorithms» more  ASIAN 2009»
14 years 11 months ago
A Dolev-Yao Model for Zero Knowledge
In cryptographic protocols, zero knowledge proofs are employed for a principal A to communicate some non-trivial information t to B while at the same time ensuring that B cannot de...
Anguraj Baskar, Ramaswamy Ramanujam, S. P. Suresh
ICIP
2003
IEEE
15 years 11 months ago
A comparative evaluation of global representation-based schemes for face verification
This paper is focused on algorithmic issues for biometric face verification (i.e., given an image of the face and an identity claim, decide whether they correspond to each other o...
Javier Ortega-Garcia, Joaquin Gonzalez-Rodriguez, ...
DAC
1996
ACM
15 years 1 months ago
Integrating Formal Verification Methods with A Conventional Project Design Flow
We present a formal verification methodology that we have used on a computer system design project. The methodology integrates a temporal logic model checker with a conventional pr...
Ásgeir Th. Eiríksson
CORR
2008
Springer
179views Education» more  CORR 2008»
14 years 10 months ago
Practical Automated Partial Verification of Multi-Paradigm Real-Time Models
This article introduces a fully automated verification technique that permits to analyze real-time systems described using a continuous notion of time and a mixture of operational...
Carlo A. Furia, Matteo Pradella, Matteo Rossi