Sciweavers

1818 search results - page 283 / 364
» Granularity-Adaptive Proof Presentation
Sort
View
132
Voted
FM
2003
Springer
98views Formal Methods» more  FM 2003»
15 years 8 months ago
Generating Counterexamples for Multi-valued Model-Checking
Counterexamples explain why a desired temporal logic property fails to hold, and as such are considered to be the most useful form of output from model-checkers. Multi-valued model...
Arie Gurfinkel, Marsha Chechik
FSE
2003
Springer
115views Cryptology» more  FSE 2003»
15 years 8 months ago
OMAC: One-Key CBC MAC
In this paper, we present One-key CBC MAC (OMAC) and prove its security for arbitrary length messages. OMAC takes only one key, K (k bits) of a block cipher E. Previously, XCBC req...
Tetsu Iwata, Kaoru Kurosawa
120
Voted
EICS
2010
ACM
15 years 8 months ago
Magellan, an evolutionary system to foster user interface design creativity
Fostering creativity in User Interface (UI) design is challenging for innovation. This paper explores the combination of model-based approaches and interactive genetic algorithms ...
Dimitri Masson, Alexandre Demeure, Gaëlle Cal...
98
Voted
GLVLSI
2002
IEEE
118views VLSI» more  GLVLSI 2002»
15 years 8 months ago
Novel interconnect modeling by using high-order compact finite difference methods
— The high-order compact finite difference (HCFD) method is adapted for interconnect modeling. Based on the compact finite difference method, the HCFD method employs the Chebys...
Qinwei Xu, Pinaki Mazumder
IPPS
2002
IEEE
15 years 8 months ago
Program Composition in Isabelle/UNITY
We describe the mechanization of recent examples of compositional reasoning, due to Charpentier and Chandy [4]. The examples illustrate a new theory for composition proposed by Ch...
Sidi O. Ehmety, Lawrence C. Paulson