Sciweavers

96 search results - page 15 / 20
» A Survey of Symbolic Methods in Computational Analysis of Cr...
Sort
View
JCS
2011
72views more  JCS 2011»
13 years 3 months ago
Automatically deriving information-theoretic bounds for adaptive side-channel attacks
We present a model of adaptive attacks which we combine with information-theoretic metrics to quantify the information revealed to an adaptive adversary. This enables us to expres...
Boris Köpf, David A. Basin
CAV
1999
Springer
125views Hardware» more  CAV 1999»
14 years 20 days ago
Model Checking of Safety Properties
Of special interest in formal verification are safety properties, which assert that the system always stays within some allowed region. A computation that violates a general linea...
Orna Kupferman, Moshe Y. Vardi
DSN
2005
IEEE
14 years 2 months ago
A Wavefront Parallelisation of CTMC Solution Using MTBDDs
In this paper, we present a parallel implementation for the steady-state analysis of continuous-time Markov chains (CTMCs). This analysis is performed via solution of a linear equ...
Yi Zhang, David Parker, Marta Z. Kwiatkowska
3DPVT
2006
IEEE
145views Visualization» more  3DPVT 2006»
14 years 2 months ago
The Recursive Multi-Frame Planar Parallax Algorithm
This paper presents a method for obtaining accurate dense elevation and appearance models of terrain using a single camera on-board an aerial platform. Applications of this method...
Christopher Geyer, Todd Templeton, Marci Meingast,...
VSTTE
2005
Springer
14 years 1 months ago
Model Checking: Back and Forth between Hardware and Software
The interplay back and forth between software model checking and hardware model checking has been fruitful for both. Originally intended for the analysis of concurrent software, mo...
Edmund M. Clarke, Anubhav Gupta, Himanshu Jain, He...