Sciweavers

1779 search results - page 171 / 356
» A Formal Model of Data Privacy
Sort
View
FMICS
2010
Springer
15 years 4 months ago
Correctness of Sensor Network Applications by Software Bounded Model Checking
We investigate the application of the software bounded model checking tool CBMC to the domain of wireless sensor networks (WSNs). We automatically generate a software behavior mode...
Frank Werner, David Faragó
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 11 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
IVA
2009
Springer
15 years 11 months ago
A Socially-Aware Memory for Companion Agents
Abstract. Memory is a vital capability for intelligent social Companions. In this paper, we introduce a simple memory model that allows a Companion to maintain a long-term relation...
Mei Yii Lim, Ruth Aylett, Wan Ching Ho, Sibylle En...
WSC
1998
15 years 6 months ago
Validation and Verification of the Simulation Model of a Photolithography Process in Semiconductor Manufacturing
Simulation modeling provides an effective and powerful approach for capturing and analyzing complex manufacturing systems. More and more decisions are based on computer generated ...
Nirupama Nayani, Mansooreh Mollaghasemi
ISSS
2002
IEEE
148views Hardware» more  ISSS 2002»
15 years 9 months ago
A Case Study of Hardware and Software Synthesis in ForSyDe
ForSyDe (FORmal SYstem DEsign) is a methodology which addresses the design of SoC applications which may contain control as well as data flow dominated parts. Starting with a for...
Ingo Sander, Axel Jantsch, Zhonghai Lu