Sciweavers

2702 search results - page 240 / 541
» Practically Applicable Formal Methods
Sort
View
CSFW
2012
IEEE
13 years 4 months ago
Verifying Privacy-Type Properties in a Modular Way
—Formal methods have proved their usefulness for analysing the security of protocols. In this setting, privacy-type security properties (e.g. vote-privacy, anonymity, unlinkabili...
Myrto Arapinis, Vincent Cheval, Stéphanie D...
IROS
2009
IEEE
172views Robotics» more  IROS 2009»
15 years 9 months ago
System interdependence analysis for autonomous mobile robots
Abstract— Autonomous mobile robots are deployed in a variety of application domains, resulting in scenario specific implementations. However these systems share common component...
Florian Rohrmüller, Georgios Lidoris, Dirk Wo...
97
Voted
IFL
2005
Springer
103views Formal Methods» more  IFL 2005»
15 years 8 months ago
The Implementation of iData
The iData Toolkit is a toolkit that allows programmers to create interactive, type-safe, dynamic web applications with state on a high level of abstraction. The key element of this...
Rinus Plasmeijer, Peter Achten
ATS
2002
IEEE
108views Hardware» more  ATS 2002»
15 years 7 months ago
Fault Set Partition for Efficient Width Compression
In this paper, we present a technique for reducing the test length of counter-based pseudo-exhaustive built-in self-testing (BIST) based on width compression method. More formally...
Emil Gizdarski, Hideo Fujiwara
133
Voted
WOSP
2005
ACM
15 years 8 months ago
A capacity management service for resource pools
Resource pools are computing environments that offer virtualized access to shared resources. When used effectively they can align the use of capacity with business needs (flexi...
Jerry Rolia, Ludmila Cherkasova, Martin F. Arlitt,...