Sciweavers

1219 search results - page 29 / 244
» Verification of Equivalent-Results Methods
Sort
View
SAFECOMP
2001
Springer
14 years 1 months ago
Project Experience with IEC 61508 and Its Consequences
The paper reports on the experiences with implementation of IEC 61508 in recent projects with European, North American and Japanese system vendors. The paper describes problems id...
Rainer Faller
FMCO
2006
Springer
103views Formal Methods» more  FMCO 2006»
14 years 11 days ago
Verifying Object-Oriented Programs with KeY: A Tutorial
This paper is a tutorial on performing formal specification and semi-automatic verification of Java programs with the formal software development tool KeY. This tutorial aims to fi...
Wolfgang Ahrendt, Bernhard Beckert, Reiner Hä...
FMICS
2010
Springer
13 years 9 months ago
A Formal Model of Identity Mixer
Identity Mixer is an anonymous credential system developed at IBM that allows users for instance to prove that they are over 18 years old without revealing their name or birthdate....
Jan Camenisch, Sebastian Mödersheim, Dieter S...
DAC
2002
ACM
14 years 9 months ago
Hole analysis for functional coverage data
One of the main goals of coverage tools is to provide the user with informative presentation of coverage information. Specifically, information on large, cohesive sets of uncovere...
Oded Lachish, Eitan Marcus, Shmuel Ur, Avi Ziv
ISARCS
2010
156views Hardware» more  ISARCS 2010»
13 years 10 months ago
A Road to a Formally Verified General-Purpose Operating System
Methods of formal description and verification represent a viable way for achieving fundamentally bug-free software. However, in reality only a small subset of the existing operati...
Martin Decký