Sciweavers

1219 search results - page 62 / 244
» Verification of Equivalent-Results Methods
Sort
View
JLP
2008
75views more  JLP 2008»
13 years 10 months ago
Automated verification of selected equivalences for security protocols
In the analysis of security protocols, methods and tools for reasoning about protocol behaviors have been quite effective. We aim to expand the scope of those methods and tools. W...
Bruno Blanchet, Martín Abadi, Cédric...
ICCAD
2003
IEEE
115views Hardware» more  ICCAD 2003»
14 years 6 months ago
Efficient Verification of Hazard-Freedom in Gate-Level Timed Asynchronous Circuits
This paper presents an efficient method for verifying hazard freedom in timed asynchronous circuits. Timed circuits are a class of asynchronous circuits that utilize explicit tim...
Curtis A. Nelson, Chris J. Myers, Tomohiro Yoneda
CAIP
2009
Springer
325views Image Analysis» more  CAIP 2009»
14 years 4 months ago
Finger-Knuckle-Print Verification Based on Band-Limited Phase-Only Correlation
This paper investigates a new automated personal authentication technique using finger-knuckle-print (FKP) imaging. First, a specific data acquisition device is developed to captur...
Lin Zhang, Lei Zhang, David Zhang
ER
2004
Springer
139views Database» more  ER 2004»
14 years 3 months ago
A Sociological Framework for Multi-agent Systems Validation and Verification
Social and intentional behaviours appear as two main components of the agent paradigm. Methods of conventional software engineering do not seem to be appropriate to gain a full kno...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...
RTCSA
1997
IEEE
14 years 2 months ago
Behavior verification of hybrid real-time requirements by qualitative formalism
Although modern control theories have been successfully applied to solve a variety of problems, they are often mathematically and physically too specific to describe and analyze t...
Jang-Soo Lee, Sung Deok Cha