Sciweavers

265 search results - page 35 / 53
» How to Prove Inductive Theorems
Sort
View
ATVA
2009
Springer
141views Hardware» more  ATVA 2009»
13 years 11 months ago
Formal Verification for High-Assurance Behavioral Synthesis
We present a framework for certifying hardware designs generated through behavioral synthesis, by using formal verification to certify the associated synthesis transformations. We ...
Sandip Ray, Kecheng Hao, Yan Chen, Fei Xie, Jin Ya...
TABLEAUX
1995
Springer
13 years 11 months ago
Constraint Model Elimination and a PTTP-Implementation
In constraint logic programming, proof procedures for Horn clauses are enhanced with an interface to efficient constraint solvers. In this paper we show how to incorporate constra...
Peter Baumgartner, Frieder Stolzenburg
CANS
2008
Springer
111views Cryptology» more  CANS 2008»
13 years 9 months ago
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
In a (r, n)-threshold secret sharing scheme, no group of (r - 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time...
Tiancheng Lou, Christophe Tartary
FMCO
2008
Springer
143views Formal Methods» more  FMCO 2008»
13 years 9 months ago
An Asynchronous Distributed Component Model and Its Semantics
This paper is placed in the context of large scale distributed programming, providing a programming model based on asynchronous components. It focuses on the semantics of asynchron...
Ludovic Henrio, Florian Kammüller, Marcela Ri...
CLIMA
2004
13 years 9 months ago
Symbolic Negotiation with Linear Logic
Abstract. Negotiation over resources and multi-agent planning are important issues in multi-agent systems research. It has been demonstrated [19] how symbolic negotiation and distr...
Peep Küngas, Mihhail Matskin