Results 1 - 10
of
354
The Gradual Verifier
- NASA Formal Methods, NFM
, 2014
"... Abstract. Static verification traditionally produces yes/no answers. It either provides a proof that a piece of code meets a property, or a counterexample showing that the property can be violated. Hence, the progress of static verification is hard to measure. Unlike in testing, where coverage metr ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
metrics can be used to track progress, static verification does not provide any intermediate result until the proof of correctness can be computed. This is in particular problematic because of the inevitable incompleteness of static verifiers. To overcome this, we propose a gradual verification approach
Developments in the Measurement of Subjective Well-Being
- Psychological Science.
, 1993
"... F or good reasons, economists have had a long-standing preference for studying peoples' revealed preferences; that is, looking at individuals' actual choices and decisions rather than their stated intentions or subjective reports of likes and dislikes. Yet people often make choices that b ..."
Abstract
-
Cited by 284 (7 self)
- Add to MetaCart
at 14°Celsius, and the average dropped to about 6.50 over the next 30 seconds, as the temperature of the water was gradually raised to 15°C. At the end of an experiment, individuals can be asked to evaluate their experience as a whole. Such a retrospective report can be thought of as representing
Verified implementations for secure and verifiable computation
"... Formal verification of the security of software systems is gradually moving from the traditional focus on idealized models, to the more ambitious goal of producing verified implementations. This trend is also present in recent work targeting the verification of crypto-graphic software, but the reach ..."
Abstract
- Add to MetaCart
Formal verification of the security of software systems is gradually moving from the traditional focus on idealized models, to the more ambitious goal of producing verified implementations. This trend is also present in recent work targeting the verification of crypto-graphic software
Catastrophic regime shifts in ecosystems: linking theory to observation.
- Trends Ecol Evol
, 2003
"... Occasionally, surprisingly large shifts occur in ecosystems. Theory suggests that such shifts can be attributed to alternative stable states. Verifying this diagnosis is important because it implies a radically different view on management options, and on the potential effects of global change on s ..."
Abstract
-
Cited by 180 (7 self)
- Add to MetaCart
Occasionally, surprisingly large shifts occur in ecosystems. Theory suggests that such shifts can be attributed to alternative stable states. Verifying this diagnosis is important because it implies a radically different view on management options, and on the potential effects of global change
Implementing TLS with Verified Cryptographic Security
"... Abstract—TLS is possibly the most used protocol for secure communications, with a 18-year history of flaws and fixes, ranging from its protocol logic to its cryptographic design, and from the Internet standard to its diverse implementations. We develop a verified reference implementation of TLS 1.2. ..."
Abstract
- Add to MetaCart
Abstract—TLS is possibly the most used protocol for secure communications, with a 18-year history of flaws and fixes, ranging from its protocol logic to its cryptographic design, and from the Internet standard to its diverse implementations. We develop a verified reference implementation of TLS 1
Implementing TLS with Verified Cryptographic Security
"... Abstract—TLS is possibly the most used protocol for secure communications, with a 18-year history of flaws and fixes, ranging from its protocol logic to its cryptographic design, and from the Internet standard to its diverse implementations. We develop a verified reference implementation of TLS 1.2. ..."
Abstract
- Add to MetaCart
Abstract—TLS is possibly the most used protocol for secure communications, with a 18-year history of flaws and fixes, ranging from its protocol logic to its cryptographic design, and from the Internet standard to its diverse implementations. We develop a verified reference implementation of TLS 1
Does a gradual transition to the virtual world increase presence
- In Proceedings of the IEEE International Virtual Reality (VR) Conference
, 2009
"... In order to increase a user’s sense of presence in an artificial environment some researchers propose a gradual transition from reality to the virtual world instead of immersing users into the virtual world directly. One approach is to start the VR experience in a virtual replica of the physical spa ..."
Abstract
-
Cited by 6 (3 self)
- Add to MetaCart
In order to increase a user’s sense of presence in an artificial environment some researchers propose a gradual transition from reality to the virtual world instead of immersing users into the virtual world directly. One approach is to start the VR experience in a virtual replica of the physical
Probabilistic Verification of Discrete Event Systems using Acceptance Sampling
- In Proc. 14th International Conference on Computer Aided Verification, volume 2404 of LNCS
, 2002
"... We propose a model independent procedure for verifying properties of discrete event systems. The dynamics of such systems can be very complex, making them hard to analyze, so we resort to methods based on Monte Carlo simulation and statistical hypothesis testing. The verification is probabilistic in ..."
Abstract
-
Cited by 124 (9 self)
- Add to MetaCart
We propose a model independent procedure for verifying properties of discrete event systems. The dynamics of such systems can be very complex, making them hard to analyze, so we resort to methods based on Monte Carlo simulation and statistical hypothesis testing. The verification is probabilistic
Reliable and Fast Detection of Gradual Events in Wireless Sensor Networks
"... Abstract. Event detection is among the most important applications of wireless sensor networks. Due to the fact that sensor readings do not always represent the true attribute values, previous literatures suggested threshold-based voting mechanism which involves collecting votes of all neighbors to ..."
Abstract
- Add to MetaCart
to disambiguate node failures from events, instead of reporting an event directly based on the judgement of single sensor node. Although such mechanism significantly reduces false positives, it inevitably introduces false negatives which lead to a detection delay under the scenario of gradual events
An Incremental Approach to Modeling Flexible Workflows Using Activity Decomposition and Gradual Refinement
"... Abstract—For existing workflow models, it is still difficult to take into account both the hierarchical relations among activities and their execution orders at the same time, as well as the dynamic uncertainties of workflow processes. Aiming at these problems, an approach to modeling flexible workf ..."
Abstract
- Add to MetaCart
workflow using activity decomposition and incremental refinement is presented. First, the activities as well as their decomposition relationship and the decomposition rules are analyzed to establish an activity decomposition model, where flexible activities, with verifying constraints, are used to package
Results 1 - 10
of
354