Sciweavers

329 search results - page 53 / 66
» Automatic Proofs for Scalecharts
Sort
View
SP
2005
IEEE
149views Security Privacy» more  SP 2005»
14 years 3 months ago
Distributed Proving in Access-Control Systems
We present a distributed algorithm for assembling a proof that a request satisfies an access-control policy expressed in a formal logic, in the tradition of Lampson et al. [16]. ...
Lujo Bauer, Scott Garriss, Michael K. Reiter
CAV
2003
Springer
140views Hardware» more  CAV 2003»
14 years 3 months ago
Certifying Optimality of State Estimation Programs
Abstract. The theme of this paper is certifying software for state estimation of dynamic systems, which is an important problem found in spacecraft, aircraft, geophysical, and in m...
Grigore Rosu, Ram Prasad Venkatesan, Jon Whittle, ...
DAC
1999
ACM
14 years 10 months ago
LISA - Machine Description Language for Cycle-Accurate Models of Programmable DSP Architectures
Abstract { This paper presents the machine description language LISA for the generation of bitand cycle accurate models of DSP processors. Based on a behavioral operation descripti...
Stefan Pees, Andreas Hoffmann, Vojin Zivojnovic, H...
ESORICS
2009
Springer
14 years 10 months ago
A Generic Security API for Symmetric Key Management on Cryptographic Devices
Security APIs are used to define the boundary between trusted and untrusted code. The security properties of existing APIs are not always clear. In this paper, we give a new generi...
Véronique Cortier, Graham Steel
TACAS
2010
Springer
225views Algorithms» more  TACAS 2010»
14 years 4 months ago
Automated Termination Analysis for Programs with Second-Order Recursion
Many algorithms on data structures such as terms (finitely branching trees) are naturally implemented by second-order recursion: A first-order procedure f passes itself as an arg...
Markus Aderhold