Sciweavers

1054 search results - page 7 / 211
» From a Verified Kernel towards Verified Systems
Sort
View
ICFEM
2004
Springer
14 years 23 days ago
Verifying a File System Implementation
Abstract. We present a correctness proof for a basic file system implementation. This implementation contains key elements of standard Unix file systems such as inodes and fixed...
Konstantine Arkoudas, Karen Zee, Viktor Kuncak, Ma...
NA
2010
153views more  NA 2010»
13 years 5 months ago
Verified error bounds for multiple roots of systems of nonlinear equations
It is well known that it is an ill-posed problem to decide whether a function has a multiple root. Even for a univariate polynomial an arbitrary small perturbation of a polynomial ...
Siegfried M. Rump, Stef Graillat
ESORICS
2009
Springer
14 years 8 months ago
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
SAFECOMP
1998
Springer
13 years 11 months ago
Refinement of Safety-Related Hazards into Verifiable Code Assertions
: This paper presents a process for the stepwise refinement of safety code assertions from identified system hazards. The code assertions are intended for use in system safety veri...
Ken Wong, Jeff Joyce
ESOP
2007
Springer
13 years 11 months ago
A Certified Lightweight Non-interference Java Bytecode Verifier
Non-interference is a semantical condition on programs that guarantees the absence of illicit information flow throughout their execution, and that can be enforced by appropriate i...
Gilles Barthe, David Pichardie, Tamara Rezk