Sciweavers

32032 search results - page 147 / 6407
» Verified programming in Guru
Sort
View
CORR
2010
Springer
58views Education» more  CORR 2010»
15 years 4 months ago
Verifying Recursive Active Documents with Positive Data Tree Rewriting
This paper considers a tree-rewriting framework for modeling documents evolving through service calls. We focus on the automatic verification of properties of documents that may c...
Blaise Genest, Anca Muscholl, Zhilin Wu
ENTCS
2008
106views more  ENTCS 2008»
15 years 4 months ago
Towards Verifying Model Transformations
In model-based software development, a complete design and analysis process involves designing the system using the design language, converting it into the analysis language, and ...
Anantha Narayanan, Gabor Karsai
CSI
2007
54views more  CSI 2007»
15 years 4 months ago
A practical verifiable multi-secret sharing scheme
C.-C. Yang, T.-Y. Chang, M.-S. Hwang [C.-C. Yang, T.-Y. Chang, M.-S. Hwang, A (t,n) multi-secret sharing scheme, Applied Mathematics and Computation 151 (2004) 483–490] proposed...
Jian-jie Zhao, Jianzhong Zhang 0005, Rong Zhao
FASE
2010
Springer
15 years 2 months ago
A Verifiable Modeling Approach to Configurable Role-Based Access Control
Role-based access control (RBAC) is a popular access control model for enterprise systems due to its economic benefit and scalability. There are many RBAC features available, each ...
Dae-Kyoo Kim, Lunjin Lu, Sangsig Kim
FM
2009
Springer
146views Formal Methods» more  FM 2009»
15 years 2 months ago
Verifying Real-Time Systems against Scenario-Based Requirements
Abstract. We propose an approach to automatic verification of realtime systems against scenario-based requirements. A real-time system is modeled as a network of Timed Automata (TA...
Kim Guldstrand Larsen, Shuhao Li, Brian Nielsen, S...