Sciweavers

2702 search results - page 147 / 541
» Practically Applicable Formal Methods
Sort
View
75
Voted
IJNSEC
2008
209views more  IJNSEC 2008»
14 years 10 months ago
Application-Specific Key Release Scheme from Biometrics
This paper outlines a novel biometric key release scheme to bind application-specific key from biometric data such that the key can be retrieved effectively by using DiscreteHashi...
Thian Song Ong, Andrew Teoh Beng Jin, David Chek L...
ORI
2008
69views more  ORI 2008»
14 years 10 months ago
Markov chain applications in the slot machine industry
One of the important sectors within gambling is that of gaming machines. This industry used to favour approaches based on long-run simulations or complete enumerations of all poss...
Noelia Oses
DAC
2008
ACM
15 years 11 months ago
Construction of concrete verification models from C++
C++ based verification methodologies are now emerging as the preferred method for SOC design. However most of the verification involving the C++ models are simulation based. The c...
Malay Haldar, Gagandeep Singh, Saurabh Prabhakar, ...
FMCAD
2008
Springer
14 years 11 months ago
Mechanized Information Flow Analysis through Inductive Assertions
We present a method for verifying information flow properties of software programs using inductive assertions and theorem proving. Given a program annotated with information flow a...
Warren A. Hunt Jr., Robert Bellarmine Krug, Sandip...
NIPS
2004
14 years 11 months ago
Hierarchical Eigensolver for Transition Matrices in Spectral Methods
We show how to build hierarchical, reduced-rank representation for large stochastic matrices and use this representation to design an efficient algorithm for computing the largest...
Chakra Chennubhotla, Allan D. Jepson