Sciweavers

1833 search results - page 26 / 367
» Mechanized Verification with Sharing
Sort
View
DBSEC
2010
161views Database» more  DBSEC 2010»
14 years 11 days ago
Secure Location Verification - A Security Analysis of GPS Signal Authentication
The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reas...
Georg T. Becker, Sherman C. Lo, David S. De Lorenz...
ORL
2008
108views more  ORL 2008»
13 years 11 months ago
Mechanism design for a multicommodity flow game in service network alliances
We study a collaborative multicommodity flow game where individual players own capacity on the edges of the network and share this capacity to deliver commodities. We present memb...
Richa Agarwal, Özlem Ergun
CCGRID
2004
IEEE
14 years 2 months ago
Protection mechanisms for application service hosting platforms
The Application Service Hosting Platform (ASHP) has recently received tremendous attention from both industry and academia. An ASHP provides a shared highperformance infrastructur...
Xuxian Jiang, Dongyan Xu, Rudolf Eigenmann
DAC
2006
ACM
14 years 12 months ago
Shielding against design flaws with field repairable control logic
Correctness is a paramount attribute of any microprocessor design; however, without novel technologies to tame the increasing complexity of design verification, the amount of bugs...
Ilya Wagner, Valeria Bertacco, Todd M. Austin
FM
1999
Springer
109views Formal Methods» more  FM 1999»
14 years 3 months ago
Compositional Symmetric Sharing in B
Sharing between B constructs is limited, both on the specification and the implementation level. The limitations stem from the single writer/multiple readers paradigm, restricted ...
Martin Büchi, Ralph-Johan Back