Sciweavers

533 search results - page 72 / 107
» Verification of Distributed Firewalls
Sort
View
ICCAD
1997
IEEE
134views Hardware» more  ICCAD 1997»
15 years 5 months ago
Post-route optimization for improved yield using a rubber-band wiring model
This paper presents a unique approach to improve yield given a routed layout. Currently after routing has been completed and compacted, it generally proceeds to verification witho...
Jeffrey Z. Su, Wayne Wei-Ming Dai
APSEC
2004
IEEE
15 years 5 months ago
The Design of Evolutionary Process Modeling Languages
To formalize a software process, its important aspects must be extracted as a model. Many processes are used repeatedly, and the ability to automate a process is also desired. One...
Darren C. Atkinson, Daniel C. Weeks, John Noll
VL
1997
IEEE
151views Visual Languages» more  VL 1997»
15 years 5 months ago
A Structured Interactive Workspace for a Visual Configuration Language
This paper shows how language technologies such as the automatic generation of parsers for analyzing user actions and visual parsing can be applied to build a flexible tool specia...
Jean-Yves Vion-Dury, François Pacull
CADE
2010
Springer
15 years 2 months ago
MCMT: A Model Checker Modulo Theories
Abstract. We describe mcmt, a fully declarative and deductive symbolic model checker for safety properties of infinite state systems whose state variables are arrays. Theories spec...
Silvio Ghilardi, Silvio Ranise
ESORICS
2010
Springer
15 years 2 months ago
Formal Analysis of Privacy for Vehicular Mix-Zones
Safety critical applications for recently proposed vehicle to vehicle ad-hoc networks (VANETs) rely on a beacon signal, which poses a threat to privacy since it could allow a vehic...
Morten Dahl, Stéphanie Delaune, Graham Stee...