Sciweavers

5525 search results - page 80 / 1105
» Verification of Model Transformations
Sort
View
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
15 years 7 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
IJCSA
2006
95views more  IJCSA 2006»
15 years 3 months ago
Modeling and Formal Verification of DHCP Using SPIN
The Dynamic Host Configuration Protocol (DHCP) is a widely used communication protocol. In this paper, a portion of the protocol is chosen for modeling and verification, namely th...
Syed M. S. Islam, Mohammed H. Sqalli, Sohel Khan
ICASSP
2011
IEEE
14 years 7 months ago
Factored covariance modeling for text-independent speaker verification
Gaussian mixture models (GMMs) are commonly used to model the spectral distribution of speech signals for text-independent speaker verification. Mean vectors of the GMM, used in c...
Eryu Wang, Kong-Aik Lee, Bin Ma, Haizhou Li, Wu Gu...
CAV
2007
Springer
114views Hardware» more  CAV 2007»
15 years 7 months ago
Configurable Software Verification: Concretizing the Convergence of Model Checking and Program Analysis
In automatic software verification, we have observed a theoretical convergence of model checking and program analysis. In practice, however, model checkers are still mostly concern...
Dirk Beyer, Thomas A. Henzinger, Grégory Th...
AOSD
2009
ACM
15 years 10 months ago
Modelling hardware verification concerns specified in the e language: an experience report
e is an aspect-oriented hardware verification language that is widely used to verify the design of electronic circuits through the development and execution of testbenches. In rec...
Darren Galpin, Cormac Driver, Siobhán Clark...