Sciweavers

181 search results - page 22 / 37
» A Practical Approach to Coverage in Model Checking
Sort
View
CAISE
2005
Springer
14 years 1 months ago
A Method and Tool for Business-IT Alignment in Enterprise Architecture
Enterprise architects seek to align enterprise processes and structure with their supporting IT systems so that enterprises can flourish in their environment. The enterprise archi...
Alain Wegmann, Pavel Balabko, Lam-Son Lê, Gi...
FC
2010
Springer
169views Cryptology» more  FC 2010»
13 years 10 months ago
A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing
Abstract. Starting from algebraic properties that enable guessing lowentropy secrets, we formalize guessing rules for symbolic verification. The rules are suited for both off-line ...
Bogdan Groza, Marius Minea
ISSS
2000
IEEE
109views Hardware» more  ISSS 2000»
13 years 12 months ago
Verification of Embedded Systems using a Petri Net based Representation
The ever increasing complexity of embedded systems consisting of hardware and software components poses a challenge in verifying their correctness, New verification methods that o...
Luis Alejandro Cortés, Petru Eles, Zebo Pen...
SMA
1995
ACM
176views Solid Modeling» more  SMA 1995»
13 years 11 months ago
Incremental algorithms for collision detection between solid models
: Fast and accurate collision detection between general solid models is a fundamental problem in solid modeling, robotics, animation and computer-simulated environments. Most of th...
Madhav K. Ponamgi, Dinesh Manocha, Ming C. Lin
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
13 years 11 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...