Sciweavers

549 search results - page 53 / 110
» Verification condition generation for conditional informatio...
Sort
View
ICFEM
1997
Springer
15 years 4 months ago
Formally Specifying and Verifying Real-Time Systems
A real-time computer system is a system that must perform its functions within specified time bounds. These systems are generally characterized by complex interactions with the en...
Richard A. Kemmerer
102
Voted
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
15 years 4 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
90
Voted
ICCS
2007
Springer
15 years 4 months ago
Efficient Measurement of the Eye Blinking by Using Decision Function for Intelligent Vehicles
In this paper, we propose an efficient measurement of the eye blinking for drowsy driver detection system that is one of the driver safety systems for the intelligent vehicle. Howe...
Ilkwon Park, Jung-Ho Ahn, Hyeran Byun
CAV
2010
Springer
206views Hardware» more  CAV 2010»
15 years 3 months ago
Dynamic Cutoff Detection in Parameterized Concurrent Programs
We consider the class of finite-state programs executed by an unbounded number of replicated threads communicating via shared variables. The thread-state reachability problem for t...
Alexander Kaiser, Daniel Kroening, Thomas Wahl
109
Voted
AMW
2010
15 years 2 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos