Sciweavers

1356 search results - page 13 / 272
» The ideal of verified software
Sort
View
IDEAL
2007
Springer
15 years 5 months ago
Hierarchical Program Representation for Program Element Matching
Many intermediate program representations are used by compilers and other software development tools. In this paper, we propose a novel representation technique that, unlike those ...
Fernando Berzal Galiano, Juan Carlos Cubero Talave...
ACSAC
2009
IEEE
15 years 3 months ago
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
Audit logs, providing information about the current and past states of systems, are one of the most important parts of modern computer systems. Providing security for audit logs on...
Attila Altay Yavuz, Peng Ning
STOC
2000
ACM
137views Algorithms» more  STOC 2000»
15 years 3 months ago
On the complexity of verifiable secret sharing and multiparty computation
We first study the problem of doing Verifiable Secret Sharing (VSS) information theoretically secure for a general access structure. We do it in the model where private channels b...
Ronald Cramer, Ivan Damgård, Stefan Dziembow...
FMICS
2006
Springer
15 years 3 months ago
Verified Design of an Automated Parking Garage
Parking garages that stow and retrieve cars automatically are becoming viable solutions for parking shortages. However, these are complex systems and a number of severe incidents i...
Aad Mathijssen, A. Johannes Pretorius
TCBB
2008
137views more  TCBB 2008»
14 years 11 months ago
Toward Verified Biological Models
The last several decades have witnessed a vast accumulation of biological data and data analysis. Many of these data sets represent only a small fraction of the system's behav...
Avital Sadot, Jasmin Fisher, Dan Barak, Yishai Adm...