Sciweavers

327 search results - page 9 / 66
» Model Checking and Evidence Exploration
Sort
View
IPPS
2002
IEEE
14 years 1 months ago
An Approach to Compositional Model Checking
A natural trend in most of the engineering disciplines is the construction of systems from components. This has the potential to reduce costs and increase reliability, provided th...
Hector A. Andrade, Beverly Sanders
ENTCS
2008
118views more  ENTCS 2008»
13 years 7 months ago
Shared Hash Tables in Parallel Model Checking
In light of recent shift towards shared-memory systems in parallel explicit model checking, we explore relative advantages and disadvantages of shared versus private hash tables. ...
Jiri Barnat, Petr Rockai
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
14 years 2 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
FMCAD
2009
Springer
14 years 3 months ago
Software model checking via large-block encoding
Abstract—Several successful approaches to software verificabased on the construction and analysis of an abstract reachability tree (ART). The ART represents unwindings of the co...
Dirk Beyer, Alessandro Cimatti, Alberto Griggio, M...
CANDC
2007
ACM
14 years 17 days ago
Constrain yourselves: exploring end user development in support for musical creativity
This research explores links between constraint development in creative processes and end user development in environments for creative tasks. A process model describing the devel...
Tim Coughlan, Peter Johnson