Sciweavers

4167 search results - page 473 / 834
» Regression model checking
Sort
View
ATVA
2010
Springer
163views Hardware» more  ATVA 2010»
15 years 5 months ago
Automatic Generation of History-Based Access Control from Information Flow Specification
This paper proposes a method for automatically inserting check statements for access control into a given recursive program according to a given security specification. A history-b...
Yoshiaki Takata, Hiroyuki Seki
ENTCS
2006
114views more  ENTCS 2006»
15 years 5 months ago
Prototyping SOS Meta-theory in Maude
We present a prototype implementation of SOS meta-theory in the Maude term rewriting language. The prototype defines the basic concepts of SOS meta-theory (e.g., transition formul...
Mohammad Reza Mousavi, Michel A. Reniers
124
Voted
FAC
2007
90views more  FAC 2007»
15 years 4 months ago
Responsiveness and stable revivals
Individual components in an inter-operating system require assurance from other components both of appropriate functionality and of suitable responsiveness. We have developed prope...
Joy N. Reed, A. W. Roscoe, J. E. Sinclair
184
Voted
CISS
2011
IEEE
14 years 8 months ago
Secret key generation through OFDM multipath channel
—We analyze the fundamental limits of key generation and describe an implementation based on error correcting codes. We show that key extraction based on channel coefficients si...
Yanpei Liu, Stark C. Draper, Akbar M. Sayeed
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 5 months ago
Algorithmic Verification of Single-Pass List Processing Programs
We introduce streaming data string transducers that map input data strings to output data strings in a single left-to-right pass in linear time. Data strings are (unbounded) seque...
Rajeev Alur, Pavol Cerný