Sciweavers

1219 search results - page 94 / 244
» Verification of Equivalent-Results Methods
Sort
View
ACMICEC
2006
ACM
111views ECommerce» more  ACMICEC 2006»
14 years 1 months ago
Passive verification of the strategyproofness of mechanisms in open environments
Consider an open infrastructure in which anyone can deploy mechanisms to support automated decision making and coordination amongst self-interested computational agents. Strategyp...
Laura Kang, David C. Parkes
ECOWS
2009
Springer
14 years 1 months ago
Run-time Verification of Behavioural Conformance for Conversational Web Services
— Web services exposing run-time behaviour that deviates from their behavioural specifications represent a major threat to the sustainability of a service-oriented ecosystem. It ...
Dimitris Dranidis, Ervin Ramollari, Dimitrios Kour...
AINA
2008
IEEE
14 years 1 days ago
Keep Passwords Away from Memory: Password Caching and Verification Using TPM
TPM is able to provide strong secure storage for sensitive data such as passwords. Although several commercial password managers have used TPM to cache passwords, they are not cap...
Hua Wang, Yao Guo, Xia Zhao, Xiangqun Chen
BCS
2008
13 years 11 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
DAC
2010
ACM
13 years 11 months ago
An efficient dual algorithm for vectorless power grid verification under linear current constraints
Vectorless power grid verification makes it possible to evaluate worst-case voltage drops without enumerating possible current waveforms. Under linear current constraints, the vec...
Xuanxing Xiong, Jia Wang