Sciweavers

2137 search results - page 162 / 428
» Proving Abstract Non-interference
Sort
View
DATE
2006
IEEE
104views Hardware» more  DATE 2006»
15 years 9 months ago
Equivalence verification of arithmetic datapaths with multiple word-length operands
Abstract: This paper addresses the problem of equivalence verification of RTL descriptions that implement arithmetic computations (add, mult, shift) over bitvectors that have diļ¬...
Namrata Shekhar, Priyank Kalla, Florian Enescu
CIG
2005
IEEE
15 years 8 months ago
How to Protect Peer-to-Peer Online Games from Cheats
Abstract- Recently, P2P (peer-to-peer) online game systems have attracted a great deal of public attention. They work without central servers, thus, the maintenance and organizatio...
Haruhiro Yoshimoto, Rie Shigetomi, Hideki Imai
EPEW
2005
Springer
15 years 8 months ago
Verifying the Conformance of Web Services to Global Interaction Protocols: A First Step
Abstract. Global choreographies define the rules that peers should respect in their interaction, with the aim of guaranteeing interoperability. act choreography can be seen as a p...
Matteo Baldoni, Cristina Baroglio, Alberto Martell...
91
Voted
STACS
2005
Springer
15 years 8 months ago
The Core of a Countably Categorical Structure
ded abstract of this article is published in the proceedings of STACS’05, LNCS 3404, Springer Verlag. A relational structure is a core, if all its endomorphisms are embeddings. T...
Manuel Bodirsky
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
15 years 8 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani