Sciweavers

504 search results - page 15 / 101
» Explaining Verification Conditions
Sort
View
COMCOM
2000
97views more  COMCOM 2000»
13 years 7 months ago
Verification of security protocols using LOTOS-method and application
We explain how the formal language LOTOS can be used to specify security protocols and cryptographic operations. We describe how security properties can be modelled as safety prop...
Guy Leduc, François Germeau
EUROMED
2010
13 years 6 months ago
Accuracy Verification of Manual 3D CG Reconstruction: Case Study of Destroyed Architectural Heritage, Bam Citadel
Abstract. We explain our approach for verifying the accuracy of 3D CG manual modeling of the Citadel of Bam, which is an architectural heritage site destroyed by an earthquake in 2...
Mohammad Reza Matini, Kinji Ono
TSE
2002
95views more  TSE 2002»
13 years 7 months ago
A Formal Specification and Verification Framework for Time Warp-Based Parallel Simulation
Peter Frey, Radharamanan Radhakrishnan, Harold W. ...
CVPR
2004
IEEE
14 years 9 months ago
A GMM Parts Based Face Representation for Improved Verification through Relevance Adaptation
Motivated by the success of parts based representations in face detection we have attempted to address some of the problems associated with applying such a philosophy to the task ...
Simon Lucey, Tsuhan Chen
TACAS
2010
Springer
151views Algorithms» more  TACAS 2010»
13 years 5 months ago
A Polymorphic Intermediate Verification Language: Design and Logical Encoding
Abstract. Intermediate languages are a paradigm to separate concerns in software verification systems when bridging the gap between programming languages and the logics understood ...
K. Rustan M. Leino, Philipp Rümmer