Sciweavers

3224 search results - page 119 / 645
» On Checking Model Checkers
Sort
View
FOCS
2005
IEEE
14 years 3 months ago
The Complexity of Online Memory Checking
We consider the problem of storing a large file on a remote and unreliable server. To verify that the file has not been corrupted, a user could store a small private (randomized...
Moni Naor, Guy N. Rothblum
AINA
2007
IEEE
14 years 4 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
CAV
2010
Springer
198views Hardware» more  CAV 2010»
14 years 2 months ago
Termination Analysis with Compositional Transition Invariants
Abstract. Modern termination provers rely on a safety checker to construct disjunctively well-founded transition invariants. This safety check is known to be the bottleneck of the ...
Daniel Kroening, Natasha Sharygina, Aliaksei Tsito...
ENTCS
2010
103views more  ENTCS 2010»
13 years 7 months ago
A Model and Analysis of the AKAP Scaffold
We study the biochemical processes involved in scaffold-mediated crosstalk between the cAMP and the Raf-1/MEK/ERK pathways. We model the system by a continuous time Markov chain w...
Oana Andrei, Muffy Calder
KBSE
1999
IEEE
14 years 2 months ago
Advanced Modelling and Verification Techniques Applied to a Cluster File System
This paper describes the application of advanced formal modelling techniques and tools from the CADP toolset to the verification of CFS, a distributed file system kernel. After a ...
Charles Pecheur