Sciweavers

1562 search results - page 154 / 313
» Convenience Over Correctness
Sort
View
CCS
2010
ACM
13 years 7 months ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin
DMS
2010
147views Multimedia» more  DMS 2010»
13 years 7 months ago
Towards Security-aware Program Visualization for Analyzing In-lined Reference Monitors
In-lined Reference Monitoring frameworks are an emerging technology for enforcing security policies over untrusted, mobile, binary code. However, formulating correct policy specifi...
Aditi Patwardhan, Kevin W. Hamlen, Kendra Cooper
FPL
2010
Springer
104views Hardware» more  FPL 2010»
13 years 7 months ago
Multiplicative Square Root Algorithms for FPGAs
Abstract--Most current square root implementations for FPGAs use a digit recurrence algorithm which is well suited to their LUT structure. However, recent computing-oriented FPGAs ...
Florent de Dinechin, Mioara Joldes, Bogdan Pasca, ...
SOFSEM
2010
Springer
13 years 7 months ago
Forcing Monotonicity in Parameterized Verification: From Multisets to Words
We present a tutorial on verification of safety properties for parameterized systems. Such a system consists of an arbitrary number of processes; the aim is to prove correctness of...
Parosh Aziz Abdulla
IGARSS
2009
13 years 7 months ago
General Framework on Change Detection in a Sparse Domain
The paper presents a general framework for change detection in radar images, for an operational purpose and in the context of environmental monitoring. This framework is based on ...
Abdourrahmane M. Atto, Grégoire Mercier, Do...