Sciweavers

738 search results - page 10 / 148
» Formal Methods: for All or for Chosen
Sort
View
IPPS
2007
IEEE
14 years 1 months ago
Formal Analysis of Time-Dependent Cryptographic Protocols in Real-Time Maude
This paper investigates the suitability of applying the general-purpose Real-Time Maude tool to the formal specification and model checking analysis of timedependent cryptographi...
Peter Csaba Ölveczky, Martin Grimeland
FMCAD
2004
Springer
13 years 11 months ago
A Functional Approach to the Formal Specification of Networks on Chip
We present a functional approach, based on the ACL2 logic, for the specification of system on a chip communication architectures. Our decomposition of the communications allows the...
Julien Schmaltz, Dominique Borrione
EKAW
1999
Springer
13 years 11 months ago
Formally Verifying Dynamic Properties of Knowledge Based Systems
Abstract. In this paper we study dynamic properties of knowledge-based systems. We argue the importance of such dynamic properties for the construction and analysis of knowledge-ba...
Perry Groot, Annette ten Teije, Frank van Harmelen
SSD
1993
Springer
237views Database» more  SSD 1993»
13 years 11 months ago
A Small Set of Formal Topological Relationships Suitable for End-User Interaction
Topological relationships between spatial objects represent important knowledge that users of geographic information systems expect to retrieve from a spatial database. A di cult t...
Eliseo Clementini, Paolino Di Felice, Peter van Oo...
MTA
2006
283views more  MTA 2006»
13 years 7 months ago
An evaluation of image based steganography methods
- Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyo...
Karen Bailey, Kevin Curran