Sciweavers

1156 search results - page 148 / 232
» Compositional Methods for Information-Hiding
Sort
View
SP
1996
IEEE
116views Security Privacy» more  SP 1996»
14 years 1 months ago
Defining Noninterference in the Temporal Logic of Actions
Covert channels are a critical concern for multilevel secure (MLS) systems. Due to their subtlety, it is desirable to use formal methods to analyze MLS systems for the presence of...
Todd Fine
ICCAD
1994
IEEE
111views Hardware» more  ICCAD 1994»
14 years 1 months ago
On modeling top-down VLSI design
We present an improved data model that reflects the whole VLSI design process including bottom-up and topdown design phases. The kernel of the model is a static version concept th...
Bernd Schürmann, Joachim Altmeyer, Martin Sch...
ISSAC
1989
Springer
87views Mathematics» more  ISSAC 1989»
14 years 1 months ago
An Improved Las Vegas Primality Test
: We present a modification of the Goldwasser-Kilian-Atkin primality test, which, when given an input n, outputs either prime or composite, along with a certificate of correctnes...
Erich Kaltofen, T. Valente, Norika Yui
ICCV
2007
IEEE
14 years 25 days ago
USSR: A Unified Framework for Simultaneous Smoothing, Segmentation, and Registration of Multiple Images
Image smoothing, segmentation and registration are three key processing steps in many computer vision applications. In this paper, we present a novel framework for achieving all t...
Nicholas A. Lord, Jeffrey Ho, Baba C. Vemuri
ECOWS
2006
Springer
14 years 19 days ago
Verifying Correctness of Web Services Choreography
This paper is about Web services used in distributed, inter-organizational business cooperation (choreography). In this application scenario, we have a multipart functional conven...
Tarek Melliti, Céline Boutrous-Saab, Sylvai...