Sciweavers

442 search results - page 23 / 89
» Model Checking of Systems Employing Commutative Functions
Sort
View
COMPSAC
2009
IEEE
14 years 3 months ago
System Safety Requirements as Control Structures
Along with the popularity of software-intensive systems, the interactions between system components and between humans and software applications are becoming more and more complex...
Zhe Chen, Gilles Motet
ENTCS
2006
168views more  ENTCS 2006»
13 years 8 months ago
A Functional Programming Framework for Latency Insensitive Protocol Validation
Latency insensitive protocols (LIPs) have been proposed as a viable means to connect synchronous IP blocks via long interconnects in a system-on-chip. The reason why one needs to ...
Syed Suhaib, Deepak Mathaikutty, Sandeep K. Shukla...
ASIACRYPT
2006
Springer
14 years 5 days ago
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
Understanding what construction strategy has a chance to be a good hash function is extremely important nowadays. In TCC'04, Maurer et al. [13] introduced the notion of indiff...
Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yu...
ATAL
2005
Springer
14 years 2 months ago
Towards a functional ontology of reputation
This paper proposes a functional ontology of reputation for agents. The goal of this ontology is twofold. First, to put together the broad knowledge about reputation produced in s...
Sara J. Casare, Jaime Simão Sichman
ICCD
2003
IEEE
98views Hardware» more  ICCD 2003»
14 years 5 months ago
Specifying and Verifying Systems with Multiple Clocks
Multiple clock domains are a challenge for hardware specification and verification. We present a method for specifying the relations between multiple clocks, and for modeling th...
Edmund M. Clarke, Daniel Kroening, Karen Yorav