Sciweavers

86 search results - page 5 / 18
» Thorough Checking Revisited
Sort
View
ATVA
2008
Springer
115views Hardware» more  ATVA 2008»
13 years 9 months ago
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...
Guoqiang Li, Mizuhito Ogawa
RTA
2010
Springer
13 years 11 months ago
On (Un)Soundness of Unravelings
We revisit (un)soundness of transformations of conditional into unconditional rewrite systems. The focus here is on so-called unravelings, the most simple and natural kind of such ...
Karl Gmeiner, Bernhard Gramlich, Felix Schernhamme...
HVC
2005
Springer
160views Hardware» more  HVC 2005»
14 years 1 months ago
Simultaneous SAT-Based Model Checking of Safety Properties
We present several algorithms for simultaneous SAT (propositional satisfiability) based model checking of safety properties. More precisely, we focus on Bounded Model Checking and ...
Zurab Khasidashvili, Alexander Nadel, Amit Palti, ...
CSCW
2002
ACM
13 years 7 months ago
Revisiting the visit: : understanding how technology can shape the museum visit
This paper reports findings from a study of how a guidebook was used by pairs of visitors touring a historic house. We describe how the guidebook was incorporated into their visit...
Rebecca E. Grinter, Paul M. Aoki, Margaret H. Szym...
FORMATS
2004
Springer
14 years 1 months ago
Bounded Model Checking for Region Automata
For successful software verification, model checkers must be capable of handling a large number of program variables. Traditional, BDD-based model checking is deficient in this reg...
Fang Yu, Bow-Yaw Wang, Yao-Wen Huang