Sciweavers

9842 search results - page 42 / 1969
» Compositional timing analysis
Sort
View
ASIACRYPT
2000
Springer
14 years 5 hour ago
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
An authenticated encryption scheme is a symmetric encryption scheme whose goal is to provide both privacy and integrity. We consider two possible notions of authenticity for such ...
Mihir Bellare, Chanathip Namprempre
FMSD
2006
103views more  FMSD 2006»
13 years 7 months ago
Compositional SCC Analysis for Language Emptiness
We propose a refinement approach to language emptiness, which is based on the enumeration and the successive refinements of SCCs on over-approximations of the exact system. Our alg...
Chao Wang, Roderick Bloem, Gary D. Hachtel, Kavita...
CSFW
2005
IEEE
14 years 1 months ago
Compositional Analysis of Contract Signing Protocols
We develop a general method for proving properties of contract-signing protocols using a specialized protocol logic. The method is applied to the Asokan-ShoupWaidner and the Garay...
Michael Backes, Anupam Datta, Ante Derek, John C. ...
AR
2006
94views more  AR 2006»
13 years 7 months ago
Stability analysis and robust composite controller synthesis for flexible joint robots
In this paper the control of exible joint manipulators is studied in detail. The model of N{axis exible joint manipulators are derived and reformulated in the form of singular per...
H. D. Taghirad, M. A. Khosravi
POPL
2010
ACM
14 years 5 months ago
Compositional May-Must Program Analysis: Unleashing the Power of Alternation
Program analysis tools typically compute two types of information: (1) may information that is true of all program executions and is used to prove the absence of bugs in the progr...
Aditya V. Nori, Patrice Godefroid, SaiDeep Tetali,...