Sciweavers

2514 search results - page 33 / 503
» The use of industrial-strength formal methods
Sort
View
MICAI
2004
Springer
15 years 7 months ago
Automatic Enrichment of Very Large Dictionary of Word Combinations on the Basis of Dependency Formalism
The paper presents a method of automatic enrichment of a very large dictionary of word combinations. The method is based on results of automatic syntactic analysis (parsing) of sen...
Alexander F. Gelbukh, Grigori Sidorov, Sang-Yong H...
CSE
2009
IEEE
15 years 8 months ago
Ceremonies Formal Analysis in PKI's Context
—Ceremonies are a useful tool to establish trust in scenarios where protocols operate. They describe a greater range of issues not taken into account by protocol designers. We ta...
Jean Everson Martina, Túlio Cicero Salvaro ...
IPPS
2007
IEEE
15 years 8 months ago
Formal Analysis of Time-Dependent Cryptographic Protocols in Real-Time Maude
This paper investigates the suitability of applying the general-purpose Real-Time Maude tool to the formal specification and model checking analysis of timedependent cryptographi...
Peter Csaba Ölveczky, Martin Grimeland
FMICS
2010
Springer
15 years 3 months ago
A Formal Model of Identity Mixer
Identity Mixer is an anonymous credential system developed at IBM that allows users for instance to prove that they are over 18 years old without revealing their name or birthdate....
Jan Camenisch, Sebastian Mödersheim, Dieter S...
EUROCAST
2005
Springer
104views Hardware» more  EUROCAST 2005»
15 years 7 months ago
A Mathematical Formalism for the Evaluation of C-Space for Redundant Robots
Abstract. This paper presents a new general method for obstacle representation in the configuration space (C-space) for redundant robots. The method is based on the analytical dec...
Roberto Therón, Vidal Moreno, Belén ...