Sciweavers

4693 search results - page 855 / 939
» Verifying Hybrid Systems
Sort
View
199
Voted
POPL
2006
ACM
16 years 29 days ago
Certified assembly programming with embedded code pointers
Embedded code pointers (ECPs) are stored handles of functions and continuations commonly seen in low-level binaries as well as functional or higher-order programs. ECPs are known ...
Zhaozhong Ni, Zhong Shao
STOC
2006
ACM
138views Algorithms» more  STOC 2006»
16 years 29 days ago
The PCP theorem by gap amplification
The PCP theorem [3, 2] says that every language in NP has a witness format that can be checked probabilistically by reading only a constant number of bits from the proof. The cele...
Irit Dinur
118
Voted
CCS
2009
ACM
15 years 7 months ago
Proximity-based access control for implantable medical devices
We propose a proximity-based access control scheme for implantable medical devices (IMDs). Our scheme is based on ultrasonic distancebounding and enables an implanted medical devi...
Kasper Bonne Rasmussen, Claude Castelluccia, Thoma...
108
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
Globally Optimal Channel Assignment for Non-Cooperative Wireless Networks
—Channel assignment is a very important topic in wireless networks. In this paper, we study FDMA channel assignment in a non-cooperative wireless network, where devices are selï¬...
Fan Wu, Sheng Zhong, Chunming Qiao
TAICPART
2006
IEEE
144views Education» more  TAICPART 2006»
15 years 6 months ago
Testing the Implementation of Business Rules Using Intensional Database Tests
One of the key roles of any information system is to enforce the business rules and policies set by the owning organisation. As for any important functionality, it is necessary to...
David Willmor, Suzanne M. Embury