Sciweavers

1222 search results - page 116 / 245
» Verifying a File System Implementation
Sort
View
115
Voted
SNPD
2004
15 years 4 months ago
Addressing State Explosion in Behavior Protocol Verification
A typical problem formal verification faces is the size of the model of a system being verified. Even for a small system, the state space of the model tends to grow exponentially (...
Martin Mach, Frantisek Plasil
111
Voted
WWW
2003
ACM
16 years 3 months ago
Content extraction signatures using XML digital signatures and custom transforms on-demand
Content Extraction Signatures (CES) enable selective disclosure of verifiable content, provide privacy for blinded content, and enable the signer to specify the content the docume...
David Squire, Laurence Bull, Peter Stañski
147
Voted
IEAAIE
2011
Springer
14 years 6 months ago
Model Checking Commitment Protocols
Using model checking to verify that interaction protocols have given properties is widely recognized as an important issue in multiagent systems where autonomous and heterogeneous ...
Mohamed El-Menshawy, Jamal Bentahar, Rachida Dssou...
117
Voted
WORDS
2003
IEEE
15 years 8 months ago
Object and Process Migration in .NET
Most of today’s distributed computing systems in the field do not support the migration of execution entities among computing nodes during runtime. The relatively static associa...
Peter Tröger, Andreas Polze
135
Voted
ICWL
2007
Springer
15 years 9 months ago
Discovery of Educational Objective on E-Learning Resource: A Competency Approach
It is indeed important to implement e-Learning platforms for education and training purposes in a variety of domains. However, facing the enormous amount of learning resources, gui...
Shi-Ming Huang, Hsiang-Yuan Hsueh, Jing-Shiuan Hua