Sciweavers

1222 search results - page 217 / 245
» Verifying a File System Implementation
Sort
View
CSFW
2009
IEEE
15 years 3 months ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
DSD
2004
IEEE
129views Hardware» more  DSD 2004»
15 years 3 months ago
Functional Validation of Programmable Architectures
Validation of programmable architectures, consisting of processor cores, coprocessors, and memory subsystems, is one of the major bottlenecks in current Systemon-Chip design metho...
Prabhat Mishra, Nikil D. Dutt
VLDB
1995
ACM
130views Database» more  VLDB 1995»
15 years 3 months ago
Improving Performance in Replicated Databases through Relaxed Coherency
Applications in finance and telecommunications (intelligent network, network management, mobile computing) cause renewed interest in distributed and replicated data management. Si...
Rainer Gallersdörfer, Matthias Nicola
96
Voted
WSC
2007
15 years 2 months ago
Enabling smooth and scalable dynamic 3d visualization of discrete-event construction simulations in outdoor augmented reality
Visualization is a powerful method for verifying, validating, and communicating the results of a simulated model. Lack of visual understanding about a simulated model is one of th...
Amir H. Behzadan, Vineet R. Kamat
ACSAC
2008
IEEE
15 years 1 months ago
Assessing Quality of Policy Properties in Verification of Access Control Policies
Access control policies are often specified in declarative languages. In this paper, we propose a novel approach, called mutation verification, to assess the quality of properties...
Evan Martin, JeeHyun Hwang, Tao Xie, Vincent C. Hu