Sciweavers

220 search results - page 9 / 44
» Verifying a signature architecture: a comparative case study
Sort
View
CBSE
2006
Springer
15 years 3 months ago
Verification of Component-Based Software Application Families
We present a novel approach which facilitates formal verification of component-based software application families using model checking. This approach enables effective composition...
Fei Xie, James C. Browne
TIT
2002
67views more  TIT 2002»
14 years 11 months ago
Capacity of multiple-transmit multiple-receive antenna architectures
The capacity of wireless communication architectures equipped with multiple transmit and receive antennas and impaired by both noise and cochannel interference is studied. We find ...
Angel Lozano, Antonia Maria Tulino
DATE
1999
IEEE
80views Hardware» more  DATE 1999»
15 years 3 months ago
Symmetric Transparent BIST for RAMs
The paper introduces the new concept of symmetric transparent BIST for RAMs. This concept allows to skip the signature prediction phase of conventional transparent BIST approaches...
Sybille Hellebrand, Hans-Joachim Wunderlich, Vyach...
JALC
2006
87views more  JALC 2006»
14 years 11 months ago
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols
Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automa...
Maurice H. ter Beek, Gabriele Lenzini, Marinella P...
119
Voted
GRID
2007
Springer
14 years 11 months ago
The Requirements of Using Provenance in e-Science Experiments
In e-Science experiments, it is vital to record the experimental process for later use such as in interpreting results, verifying that the correct process took place or tracing whe...
Simon Miles, Paul T. Groth, Miguel Branco, Luc Mor...