Sciweavers

2153 search results - page 120 / 431
» From Requirements Models to Formal Specifications in B
Sort
View
ASPDAC
2005
ACM
123views Hardware» more  ASPDAC 2005»
14 years 2 months ago
Comparing high-level modeling approaches for embedded system design
- This paper presents a comparison between three different high-level modeling approaches for embedded systems design, focusing on systems that require dataflow models. The propose...
Lisane B. de Brisolara, Leandro Buss Becker, Luigi...
DAC
2009
ACM
14 years 2 months ago
Non-cycle-accurate sequential equivalence checking
We present a novel technique for Sequential Equivalence Checking (SEC) between non-cycle-accurate designs. The problem is routinely encountered in verifying the correctness of a s...
Pankaj Chauhan, Deepak Goyal, Gagan Hasteer, Anmol...
CTRSA
2005
Springer
221views Cryptology» more  CTRSA 2005»
14 years 2 months ago
Accumulators from Bilinear Pairings and Applications
We propose a dynamic accumulator scheme from bilinear pairings, whose security is based on the Strong Diffie-Hellman assumption. We show applications of this accumulator in constru...
Lan Nguyen
KBSE
2005
IEEE
14 years 2 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
ICFCA
2004
Springer
14 years 2 months ago
FCA in Knowledge Technologies: Experiences and Opportunities
Abstract. Managing knowledge is a difficult and slippery enterprise. A wide variety of technologies have to be invoked in providing support for knowledge requirements, ranging fro...
Yannis Kalfoglou, Srinandan Dasmahapatra, Yun-Heh ...