Sciweavers

1809 search results - page 98 / 362
» Software Model Checking Using Linear Constraints
Sort
View
FSE
2004
Springer
84views Cryptology» more  FSE 2004»
14 years 2 months ago
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines
We present a realization of an LFSM that utilizes an LFSR. This is based on a well-known fact from linear algebra. This structure is used to show that a previous attempt at using a...
Jin Hong, Dong Hoon Lee 0002, Seongtaek Chee, Pala...
IEEEARES
2009
IEEE
13 years 6 months ago
Software Inspections Using Guided Checklists to Ensure Security Goals
Security is a crucial issue in many modern software systems and can lead to immense costs if required security goals are not fulfilled. Fewer techniques exist to address the syste...
Frank Elberzhager, Alexander Klaus, Marek Jawurek
ISBI
2009
IEEE
14 years 3 months ago
Integrated Modeling and Reconstruction with Sparsity Constraints for FDOT
We present a numerical framework for Fluorescence Diffuse Optical Tomography (fDOT) that combines a forward model together with an iterative reconstruction procedure. Using rapid ...
Jean-Charles Baritaux, Matthieu Guerquin-Kern, Mic...
HYBRID
2010
Springer
14 years 4 months ago
Compositional analysis for linear control systems
The complexity of physical and engineering systems, both in terms of the governing physical phenomena and the number of subprocesses involved, is mirrored in ever more complex mat...
Florian Kerber, Arjan van der Schaft
IFIP
2001
Springer
14 years 1 months ago
Functional Test Generation using Constraint Logic Programming
— Semi-formal verification based on symbolic simulation offers a good compromise between formal model checking and numerical simulation. The generation of functional test vector...
Zhihong Zeng, Maciej J. Ciesielski, Bruno Rouzeyre