Sciweavers

108 search results - page 16 / 22
» Specifying and checking component usage
Sort
View
SAC
2008
ACM
14 years 9 months ago
Offline count-limited certificates
In this paper, we present the idea of offline count-limited certificates (or clics for short), and show how these can be implemented using minimal trusted hardware functionality a...
Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rho...
SBMF
2009
Springer
105views Formal Methods» more  SBMF 2009»
15 years 4 months ago
Verifying Compiled File System Code
Abstract. This paper presents a case study on retrospective verication of the Linux Virtual File System (VFS), which is aimed at checking for violations of API usage rules and mem...
Jan Tobias Mühlberg, Gerald Lüttgen
ISCIS
2005
Springer
15 years 3 months ago
Admission Control for Multicast Routing with Quality of Service in Ad Hoc Networks
Ad hoc networks, being able to organize themselves without user intervention, can easily provide their users with mobility, multimedia support and group communication. However, the...
Kaan Bür, Cem Ersoy
ICASSP
2010
IEEE
14 years 9 months ago
Collaborative spectrum sensing from sparse observations using matrix completion for cognitive radio networks
— In cognitive radio, spectrum sensing is a key component to detect spectrum holes (i.e., channels not used by any primary users). Collaborative spectrum sensing among the cognit...
Jia Meng, Wotao Yin, Husheng Li, Ekram Hossain, Zh...
TACAS
2012
Springer
277views Algorithms» more  TACAS 2012»
13 years 5 months ago
Proving Reachability Using FShell - (Competition Contribution)
FShell is an automated white-box test-input generator for C programs, computing test data with respect to user-specified code coverage criteria. The pillars of FShell are the decl...
Andreas Holzer, Daniel Kroening, Christian Schallh...