Sciweavers

73 search results - page 10 / 15
» Strengthening properties using abstraction refinement
Sort
View
CRYPTO
2001
Springer
125views Cryptology» more  CRYPTO 2001»
15 years 2 months ago
Robust Non-interactive Zero Knowledge
Abstract. Non-Interactive Zero Knowledge (NIZK), introduced by Blum, Feldman, and Micali in 1988, is a fundamental cryptographic primitive which has attracted considerable attentio...
Alfredo De Santis, Giovanni Di Crescenzo, Rafail O...
ESORICS
2004
Springer
15 years 1 months ago
Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage
Abstract. We revisit the classical notion of noninterference for statebased systems, as presented by Rushby in 1992. We strengthen his results in several ways, in particular clarif...
David von Oheimb
CAV
2006
Springer
95views Hardware» more  CAV 2006»
15 years 1 months ago
Yasm: A Software Model-Checker for Verification and Refutation
Example Guided Abstraction Refinement (CEGAR) [6] framework. A number of wellengineered software model-checkers are available, e.g., SLAM [1] and BLAST [12]. Why build another one?...
Arie Gurfinkel, Ou Wei, Marsha Chechik
MP
2008
117views more  MP 2008»
14 years 9 months ago
Multiplier convergence in trust-region methods with application to convergence of decomposition methods for MPECs
Abstract. We study piecewise decomposition methods for mathematical programs with equilibrium constraints (MPECs) for which all constraint functions are linear. At each iteration o...
Giovanni Giallombardo, Daniel Ralph
91
Voted
ENTCS
2008
135views more  ENTCS 2008»
14 years 9 months ago
Formal Specification Generation from Requirement Documents
Automatic generation of formal specifications from requirement reduces cost and complexity of formal models creation. Thus, the generated formal model brings the possibility to ca...
Gustavo Cabral, Augusto Sampaio