Sciweavers

137 search results - page 19 / 28
» Some recent advances in automated analysis
Sort
View
LICS
1999
IEEE
15 years 2 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
78
Voted
ICDE
2009
IEEE
195views Database» more  ICDE 2009»
15 years 4 months ago
The PRISM Workwench: Database Schema Evolution without Tears
— Information Systems are subject to a perpetual evolution, which is particularly pressing in Web Information Systems, due to their distributed and often collaborative nature. Su...
Carlo Curino, Hyun J. Moon, MyungWon Ham, Carlo Za...
DATE
2008
IEEE
122views Hardware» more  DATE 2008»
15 years 4 months ago
Simulation-Directed Invariant Mining for Software Verification
With the advance of SAT solvers, transforming a software program to a propositional formula has generated much interest for bounded model checking of software in recent years. How...
Xueqi Cheng, Michael S. Hsiao
ITNG
2008
IEEE
15 years 4 months ago
An Efficient Technique for Distance Computation in Road Networks
With recent advances in wireless communication and position technologies, it became possible to collect and record trajectories of moving objects. Thus, many services in road netw...
Xu Jianqiu, Victor Teixeira de Almeida, Qin Xiaoli...
INFOCOM
2007
IEEE
15 years 4 months ago
Optimization Based Rate Control for Multicast with Network Coding
— Recent advances in network coding have shown great potential for efficient information multicasting in communication networks, in terms of both network throughput and network ...
Lijun Chen, Tracey Ho, Steven H. Low, Mung Chiang,...