Sciweavers

103 search results - page 7 / 21
» A Formal Methods Approach to Medical Device Review
Sort
View
TPHOL
2009
IEEE
14 years 5 months ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...
COLING
1992
14 years 15 hour ago
A Constraint-Based Approach To Translating Anaphoric Dependencies
The normal method for representing anaphoric dependencies in Unification Based grammar tbrmalisms is that of re-entrance. In this paper, we address the problems that this represen...
Louisa Sadler, Doug Arnold
ACSD
2004
IEEE
125views Hardware» more  ACSD 2004»
14 years 2 months ago
Comparison of Methods for Supervisory Control and Submodule Construction
Over the last 25 years, methods for supervisory control of discrete event systems and methods for submodule construction based on state machine specifications have been developed ...
Gregor von Bochmann, Bassel Daou
ACSC
2006
IEEE
14 years 5 months ago
Interaction design for a mobile context-aware system using discrete event modelling
This paper describes our experience when applying formal methods in the design of the tourist information system TIP, which presents context-sensitive information to mobile users ...
Annika Hinze, Petra Malik, Robi Malik
CAV
2009
Springer
150views Hardware» more  CAV 2009»
14 years 11 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur