Sciweavers

798 search results - page 67 / 160
» Proving More Properties with Bounded Model Checking
Sort
View
FAC
2007
128views more  FAC 2007»
15 years 4 months ago
Verifying a signature architecture: a comparative case study
Abstract. We report on a case study in applying different formal methods to model and verify an architecture for administrating digital signatures. The architecture comprises seve...
David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki...
PLDI
2012
ACM
13 years 6 months ago
Speculative linearizability
Linearizability is a key design methodology for reasoning about tations of concurrent abstract data types in both shared memory and message passing systems. It provides the illusi...
Rachid Guerraoui, Viktor Kuncak, Giuliano Losa
JSAC
2006
157views more  JSAC 2006»
15 years 4 months ago
Traffic grooming in path, star, and tree networks: complexity, bounds, and algorithms
We consider the problem of traffic grooming in WDM path, star, and tree networks. Traffic grooming is a variant of the well-known logical topology design, and is concerned with the...
Shu Huang, Rudra Dutta, George N. Rouskas
BIS
2008
92views Business» more  BIS 2008»
15 years 5 months ago
Structural Detection of Deadlocks in Business Process Models
Abstract. A common task in business process modelling is the verification of process models regarding syntactical and structural errors. While the former might be checked with low ...
Ahmed Awad, Frank Puhlmann
CTRSA
2007
Springer
171views Cryptology» more  CTRSA 2007»
15 years 6 months ago
Compact E-Cash from Bounded Accumulator
Abstract. Known compact e-cash schemes are constructed from signature schemes with efficient protocols and verifiable random functions. In this paper, we introduce a different ap...
Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu