Sciweavers

535 search results - page 19 / 107
» Checking Computations in Polylogarithmic Time
Sort
View
ESORICS
2010
Springer
13 years 8 months ago
On E-Vote Integrity in the Case of Malicious Voter Computers
Norway has started to implement e-voting (over the Internet, and by using voters' own computers) within the next few years. The vulnerability of voter's computers was ide...
Sven Heiberg, Helger Lipmaa, Filip van Laenen
ATVA
2008
Springer
131views Hardware» more  ATVA 2008»
13 years 9 months ago
Computation Tree Regular Logic for Genetic Regulatory Networks
Model checking has proven to be a useful analysis technique not only for concurrent systems, but also for the genetic regulatory networks (Grns) that govern the functioning of livi...
Radu Mateescu, Pedro T. Monteiro, Estelle Dumas, H...
ICN
2009
Springer
14 years 8 days ago
Trainspotting, a WSN-Based Train Integrity System
In contrast to classic train protection systems where most of the safety measures are built into the rail infrastructure, future versions of the European railway safety system ERT...
Hans Scholten, Roel Westenberg, Manfred Schoemaker
TCS
2010
13 years 6 months ago
Detecting synchronisation of biological oscillators by model checking
We define a subclass of timed automata, called oscillator timed automata, suitable to model biological oscillators. Coupled biological oscillators may synchronise, as emerging be...
Ezio Bartocci, Flavio Corradini, Emanuela Merelli,...
CASSIS
2004
Springer
14 years 1 months ago
A Type System for Checking Applet Isolation in Java Card
A Java Card applet is, in general, not allowed to access fields and methods of other applets on the same smart card. This applet isolation property is enforced by dynamic checks i...
Werner Dietl, Peter Müller, Arnd Poetzsch-Hef...