Sciweavers

478 search results - page 54 / 96
» Formal Methods for Specifying, Validating, and Verifying Req...
Sort
View
PE
2002
Springer
132views Optimization» more  PE 2002»
13 years 8 months ago
Performance evaluation with temporal rewards
Today many formalisms exist for specifying complex Markov chains. In contrast, formalisms for specifying rewards, enabling the analysis of long-run average performance properties,...
Jeroen Voeten
IFM
2010
Springer
142views Formal Methods» more  IFM 2010»
13 years 7 months ago
An Event-B Approach to Data Sharing Agreements
A Data Sharing Agreement (DSA) is a contract among two or more principals regulating how they share data. Agreements are usually represented as a set of clauses expressed using the...
Alvaro E. Arenas, Benjamin Aziz, Juan Bicarregui, ...
JALC
2006
87views more  JALC 2006»
13 years 8 months ago
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols
Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automa...
Maurice H. ter Beek, Gabriele Lenzini, Marinella P...
CRYPTO
2006
Springer
155views Cryptology» more  CRYPTO 2006»
14 years 12 days ago
A Method for Making Password-Based Key Exchange Resilient to Server Compromise
This paper considers the problem of password-authenticated key exchange (PAKE) in a client-server setting, where the server authenticates using a stored password file, and it is de...
Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan
ACL
1996
13 years 10 months ago
Combining Trigram-based and Feature-based Methods for Context-Sensitive Spelling Correction
This paper addresses the problem of correcting spelling errors that result in valid, though unintended words (such as peace and piece, or quiet and quite) and also the problem of ...
Andrew R. Golding, Yves Schabes