Sciweavers

506 search results - page 59 / 102
» Where Is the Value in a Program Verifier
Sort
View
105
Voted
KDD
2006
ACM
129views Data Mining» more  KDD 2006»
16 years 29 days ago
Bias and controversy: beyond the statistical deviation
In this paper, we investigate how deviation in evaluation activities may reveal bias on the part of reviewers and controversy on the part of evaluated objects. We focus on a `data...
Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang
100
Voted
IAT
2005
IEEE
15 years 6 months ago
Trust Model for Open Ubiquitous Agent Systems
Trust management model that we present is adapted for ubiquitous devices cooperation, rather than for classic client-supplier relationship. We use fuzzy numbers to represent trust...
Martin Rehák, Lukás Foltýn, M...
126
Voted
FM
2009
Springer
163views Formal Methods» more  FM 2009»
15 years 5 months ago
Analysis of a Clock Synchronization Protocol for Wireless Sensor Networks
We study a clock synchronization protocol for the Chess WSN. First, we model the protocol as a network of timed automata and verify various instances using the Uppaal model checker...
Faranak Heidarian, Julien Schmaltz, Frits W. Vaand...
120
Voted
TACAS
1998
Springer
98views Algorithms» more  TACAS 1998»
15 years 4 months ago
Efficient Modeling of Memory Arrays in Symbolic Ternary Simulation
This paper enables symbolic ternary simulation of systems with large embedded memories. Each memory array is replaced with a behavioral model, where the number of symbolic variable...
Miroslav N. Velev, Randal E. Bryant
86
Voted
ISSA
2008
15 years 2 months ago
Application of Message Digests for the Verification of Logical Forensic Data
A message digest is a fixed length output produced by applying a cryptographic algorithm on input binary data of arbitrary length. If the input data changes even by one bit, the g...
Pontjho Mokhonoana, Martin S. Olivier