Sciweavers

3224 search results - page 119 / 645
» On Checking Model Checkers
Sort
View
109
Voted
FOCS
2005
IEEE
15 years 8 months ago
The Complexity of Online Memory Checking
We consider the problem of storing a large file on a remote and unreliable server. To verify that the file has not been corrupted, a user could store a small private (randomized...
Moni Naor, Guy N. Rothblum
AINA
2007
IEEE
15 years 9 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
95
Voted
CAV
2010
Springer
198views Hardware» more  CAV 2010»
15 years 6 months ago
Termination Analysis with Compositional Transition Invariants
Abstract. Modern termination provers rely on a safety checker to construct disjunctively well-founded transition invariants. This safety check is known to be the bottleneck of the ...
Daniel Kroening, Natasha Sharygina, Aliaksei Tsito...
ENTCS
2010
103views more  ENTCS 2010»
14 years 12 months ago
A Model and Analysis of the AKAP Scaffold
We study the biochemical processes involved in scaffold-mediated crosstalk between the cAMP and the Raf-1/MEK/ERK pathways. We model the system by a continuous time Markov chain w...
Oana Andrei, Muffy Calder
122
Voted
KBSE
1999
IEEE
15 years 6 months ago
Advanced Modelling and Verification Techniques Applied to a Cluster File System
This paper describes the application of advanced formal modelling techniques and tools from the CADP toolset to the verification of CFS, a distributed file system kernel. After a ...
Charles Pecheur