Sciweavers

323 search results - page 23 / 65
» Verify Your Runs
Sort
View
ENTCS
2006
103views more  ENTCS 2006»
13 years 7 months ago
Static Equivalence is Harder than Knowledge
There are two main ways of defining secrecy of cryptographic protocols. The first version checks if the adversary can learn the value of a secret parameter. In the second version,...
Johannes Borgström
CORR
2002
Springer
88views Education» more  CORR 2002»
13 years 7 months ago
SPINning Parallel Systems Software
We describe our experiences in using Spin to verify parts of the Multi Purpose Daemon (MPD) parallel process management system. MPD is a distributed collection of processes connect...
Olga Shumsky Matlin, Ewing L. Lusk, William McCune
HYBRID
2007
Springer
14 years 1 months ago
Systematic Simulation Using Sensitivity Analysis
In this paper we propose a new technique for verification by simulation of continuous and hybrid dynamical systems with uncertain initial conditions. We provide an algorithmic met...
Alexandre Donzé, Oded Maler
PDCAT
2004
Springer
14 years 26 days ago
Tamper Resistant Software by Integrity-Based Encryption
There are many situations in which it is desirable to protect a piece of software from illegitimate tampering once it gets distributed to the users. Protecting the software code me...
Jaewon Lee, Heeyoul Kim, Hyunsoo Yoon
AVSS
2003
IEEE
14 years 24 days ago
A Reliable-Inference Framework for Recognition of Human Actions
We present an action recognition method based on the concept of reliable inference. Our approach is formulated in a probabilistic framework using posterior class ratios to verify ...
James W. Davis, Ambrish Tyagi