Sciweavers

1356 search results - page 57 / 272
» The ideal of verified software
Sort
View
RV
2010
Springer
153views Hardware» more  RV 2010»
14 years 9 months ago
Run-Time Verification of Networked Software
Most applications that are in use today inter-operate with other applications, so-called peers, over a network. The analysis of such distributed applications requires that the effe...
Cyrille Valentin Artho
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
15 years 5 months ago
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer is...
Rachna Dhamija, J. D. Tygar
FMCAD
2007
Springer
15 years 3 months ago
Circuit Level Verification of a High-Speed Toggle
As VLSI fabrication technology progresses to 65nm feature sizes and smaller, transistors no longer operate as ideal switches. This motivates verifying digital circuits using contin...
Chao Yan, Mark R. Greenstreet
COMCOM
2000
125views more  COMCOM 2000»
14 years 11 months ago
On object initialization in the Java bytecode
Java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted Java programs ...
Stephane Doyon, Mourad Debbabi
AGILEDC
2005
IEEE
15 years 5 months ago
Estimating in Actual Time
In an effort to improve our understanding of the way we work, my team grouped together ideas from various sources to come up with an estimation scheme that avoided the confusing n...
Moses M. Hohman