Sciweavers

533 search results - page 72 / 107
» Verification of Distributed Firewalls
Sort
View
ICCAD
1997
IEEE
134views Hardware» more  ICCAD 1997»
14 years 2 months ago
Post-route optimization for improved yield using a rubber-band wiring model
This paper presents a unique approach to improve yield given a routed layout. Currently after routing has been completed and compacted, it generally proceeds to verification witho...
Jeffrey Z. Su, Wayne Wei-Ming Dai
APSEC
2004
IEEE
14 years 1 months ago
The Design of Evolutionary Process Modeling Languages
To formalize a software process, its important aspects must be extracted as a model. Many processes are used repeatedly, and the ability to automate a process is also desired. One...
Darren C. Atkinson, Daniel C. Weeks, John Noll
VL
1997
IEEE
151views Visual Languages» more  VL 1997»
14 years 1 months ago
A Structured Interactive Workspace for a Visual Configuration Language
This paper shows how language technologies such as the automatic generation of parsers for analyzing user actions and visual parsing can be applied to build a flexible tool specia...
Jean-Yves Vion-Dury, François Pacull
CADE
2010
Springer
13 years 11 months ago
MCMT: A Model Checker Modulo Theories
Abstract. We describe mcmt, a fully declarative and deductive symbolic model checker for safety properties of infinite state systems whose state variables are arrays. Theories spec...
Silvio Ghilardi, Silvio Ranise
ESORICS
2010
Springer
13 years 11 months ago
Formal Analysis of Privacy for Vehicular Mix-Zones
Safety critical applications for recently proposed vehicle to vehicle ad-hoc networks (VANETs) rely on a beacon signal, which poses a threat to privacy since it could allow a vehic...
Morten Dahl, Stéphanie Delaune, Graham Stee...