Sciweavers

3318 search results - page 162 / 664
» The Weak Instance Model
Sort
View
CAV
2005
Springer
129views Hardware» more  CAV 2005»
14 years 1 months ago
Symbolic Systems, Explicit Properties: On Hybrid Approaches for LTL Symbolic Model Checking
In this work we study hybrid approaches to LTL symbolic model checking; that is, approaches that use explicit representations of the property automaton, whose state space is often ...
Roberto Sebastiani, Stefano Tonetta, Moshe Y. Vard...
JIT
2004
Springer
166views Database» more  JIT 2004»
14 years 1 months ago
Feature-Oriented Development of Software Product Lines: Mapping Feature Models to the Architecture
Software product lines (PLs) present a solid approach in large scale reuse. Due to the PLs’ inherit complexity, many PL methods use the notion of ”features” to support requir...
Periklis Sochos, Ilka Philippow, Matthias Riebisch
CRYPTO
2003
Springer
187views Cryptology» more  CRYPTO 2003»
14 years 1 months ago
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model
We consider the problem of constructing randomness extractors that are locally computable; that is, read only a small number of bits from their input. As recently shown by Lu (thi...
Salil P. Vadhan
FM
2003
Springer
115views Formal Methods» more  FM 2003»
14 years 1 months ago
Model Checking FTA
Safety is increasingly important for software based, critical systems. Fault tree analysis (FTA) is a safety technique from engineering, developed for analyzing and assessing syste...
Andreas Thums, Gerhard Schellhorn
SAC
2009
ACM
14 years 26 days ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell