Sciweavers

213 search results - page 14 / 43
» A Model of Stateful Firewalls and Its Properties
Sort
View
IPPS
1999
IEEE
13 years 12 months ago
Mechanical Verification of a Garbage Collector
Abstract. We describe how the PVS verification system has been used to verify a safety property of a garbage collection algorithm, originally suggested by Ben-Ari. The safety prope...
Klaus Havelund
IJCAI
1993
13 years 8 months ago
A Representationalist Theory of Intention
Several formalizations of cognitive state that include intentions and beliefs based on normal modal logics (NMLs) have appeared in the recent literature. We argue that NMLs are no...
Kurt Konolige, Martha E. Pollack
ENTCS
2006
133views more  ENTCS 2006»
13 years 7 months ago
Linking Semantic Models to Support CSP || B Consistency Checking
Consistency checking in the CSP B approach verifies that an individual controller process, defined using a sequential non-divergent subset of CSP, never calls a B operation outsid...
Neil Evans, Helen Treharne
IFIP
2009
Springer
13 years 5 months ago
Finite Models in FOL-Based Crypto-Protocol Verification
Cryptographic protocols can only be secure under certain inequality assumptions. Axiomatizing these inequalities explicitly is problematic: stating too many inequalities may impair...
Jan Jürjens, Tjark Weber
POPL
1999
ACM
13 years 12 months ago
Software Watermarking: Models and Dynamic Embeddings
Watermarking embeds a secret message into a cover message. In media watermarking the secret is usually a copyright notice and the cover a digital image. Watermarking an object dis...
Christian S. Collberg, Clark D. Thomborson