Sciweavers

617 search results - page 55 / 124
» Using Formal Methods in a Retrospective Safety Case
Sort
View
CCS
2008
ACM
13 years 9 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
ICCV
2005
IEEE
14 years 9 months ago
Shape Recovery of 3D Data Obtained from a Moving Range Sensor by Using Image Sequences
For a large object, scanning from the air is one of the most efficient methods of obtaining 3D data. But in the case of large cultural heritage objects, there are some difficultie...
Atsuhiko Banno, Katsushi Ikeuchi
SIGSOFT
2000
ACM
14 years 10 hour ago
COM revisited: tool-assisted modelling of an architectural framework
Designing architectural frameworks without the aid of formal modeling is error prone. But, unless supported by analysis, formal modeling is prone to its own class of errors, in wh...
Daniel Jackson, Kevin J. Sullivan
ICIP
2008
IEEE
14 years 9 months ago
Fast adaptive elliptical filtering using box splines
We demonstrate that it is possible to filter an image with an elliptic window of varying size, elongation and orientation with a fixed computational cost per pixel. Our method inv...
Arrate Muñoz-Barrutia, Kunal Narayan Chaudh...
AFP
1995
Springer
128views Formal Methods» more  AFP 1995»
13 years 11 months ago
Monads for Functional Programming
Abstract. The use of monads to structure functional programs is described. Monads provide a convenient framework for simulating effects found in other languages, such as global st...
Philip Wadler