Sciweavers

719 search results - page 112 / 144
» Proving Security Protocols Correct
Sort
View
DATE
2009
IEEE
178views Hardware» more  DATE 2009»
15 years 4 months ago
Correct-by-construction generation of device drivers based on RTL testbenches
Abstract—The generation of device drivers is a very time consuming and error prone activity. All the strategies proposed up to now to simplify this operation require a manual, ev...
Nicola Bombieri, Franco Fummi, Graziano Pravadelli...
DSN
2007
IEEE
15 years 4 months ago
The Case for FEC-Based Reliable Multicast in Wireless Mesh Networks
Many important applications in wireless mesh networks require reliable multicast communication. Previously, Forward Error Correction (FEC) techniques have been proved successful f...
Dimitrios Koutsonikolas, Y. Charlie Hu
TGC
2005
Springer
15 years 3 months ago
A Distributed Object-Oriented Language with Session Types
Abstract. In the age of the world-wide web and mobile computing, programming communication-centric software is essential. Thus, programmers and program designers are exposed to new...
Mariangiola Dezani-Ciancaglini, Nobuko Yoshida, Al...
94
Voted
ENTCS
2006
122views more  ENTCS 2006»
14 years 9 months ago
Verification of Clock Synchronization Algorithms: Experiments on a Combination of Deductive Tools
We report on an experiment in combining Isabelle with automatic first-order arithmetic provers to increase automation on the verification of distributed protocols. As a case study...
Damián Barsotti, Leonor Prensa Nieto, Alwen...
76
Voted
COCO
2004
Springer
84views Algorithms» more  COCO 2004»
15 years 3 months ago
Properties of NP-Complete Sets
We study several properties of sets that are complete for NP. We prove that if L is an NP-complete set and S ⊇ L is a p-selective sparse set, then L − S is ≤p m-hard for NP....
Christian Glaßer, Aduri Pavan, Alan L. Selma...