• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 354
Next 10 →

The Gradual Verifier

by Stephan Arlt , Cindy Rubio-González , Philipp Rümmer , Martin Schäf , Natarajan Shankar - NASA Formal Methods, NFM , 2014
"... Abstract. Static verification traditionally produces yes/no answers. It either provides a proof that a piece of code meets a property, or a counterexample showing that the property can be violated. Hence, the progress of static verification is hard to measure. Unlike in testing, where coverage metr ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
metrics can be used to track progress, static verification does not provide any intermediate result until the proof of correctness can be computed. This is in particular problematic because of the inevitable incompleteness of static verifiers. To overcome this, we propose a gradual verification approach

Developments in the Measurement of Subjective Well-Being

by Daniel Kahneman , Alan B Krueger - Psychological Science. , 1993
"... F or good reasons, economists have had a long-standing preference for studying peoples' revealed preferences; that is, looking at individuals' actual choices and decisions rather than their stated intentions or subjective reports of likes and dislikes. Yet people often make choices that b ..."
Abstract - Cited by 284 (7 self) - Add to MetaCart
at 14°Celsius, and the average dropped to about 6.50 over the next 30 seconds, as the temperature of the water was gradually raised to 15°C. At the end of an experiment, individuals can be asked to evaluate their experience as a whole. Such a retrospective report can be thought of as representing

Verified implementations for secure and verifiable computation

by Jose ́ Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Guillaume Davy, Pierre-yves Strub
"... Formal verification of the security of software systems is gradually moving from the traditional focus on idealized models, to the more ambitious goal of producing verified implementations. This trend is also present in recent work targeting the verification of crypto-graphic software, but the reach ..."
Abstract - Add to MetaCart
Formal verification of the security of software systems is gradually moving from the traditional focus on idealized models, to the more ambitious goal of producing verified implementations. This trend is also present in recent work targeting the verification of crypto-graphic software

Catastrophic regime shifts in ecosystems: linking theory to observation.

by Marten Scheffer , Stephen R Carpenter - Trends Ecol Evol , 2003
"... Occasionally, surprisingly large shifts occur in ecosystems. Theory suggests that such shifts can be attributed to alternative stable states. Verifying this diagnosis is important because it implies a radically different view on management options, and on the potential effects of global change on s ..."
Abstract - Cited by 180 (7 self) - Add to MetaCart
Occasionally, surprisingly large shifts occur in ecosystems. Theory suggests that such shifts can be attributed to alternative stable states. Verifying this diagnosis is important because it implies a radically different view on management options, and on the potential effects of global change

Implementing TLS with Verified Cryptographic Security

by unknown authors
"... Abstract—TLS is possibly the most used protocol for secure communications, with a 18-year history of flaws and fixes, ranging from its protocol logic to its cryptographic design, and from the Internet standard to its diverse implementations. We develop a verified reference implementation of TLS 1.2. ..."
Abstract - Add to MetaCart
Abstract—TLS is possibly the most used protocol for secure communications, with a 18-year history of flaws and fixes, ranging from its protocol logic to its cryptographic design, and from the Internet standard to its diverse implementations. We develop a verified reference implementation of TLS 1

Implementing TLS with Verified Cryptographic Security

by unknown authors
"... Abstract—TLS is possibly the most used protocol for secure communications, with a 18-year history of flaws and fixes, ranging from its protocol logic to its cryptographic design, and from the Internet standard to its diverse implementations. We develop a verified reference implementation of TLS 1.2. ..."
Abstract - Add to MetaCart
Abstract—TLS is possibly the most used protocol for secure communications, with a 18-year history of flaws and fixes, ranging from its protocol logic to its cryptographic design, and from the Internet standard to its diverse implementations. We develop a verified reference implementation of TLS 1

Does a gradual transition to the virtual world increase presence

by Frank Steinicke, Gerd Bruder, Klaus Hinrichs, Er L. Gerlach, Anthony Steed - In Proceedings of the IEEE International Virtual Reality (VR) Conference , 2009
"... In order to increase a user’s sense of presence in an artificial environment some researchers propose a gradual transition from reality to the virtual world instead of immersing users into the virtual world directly. One approach is to start the VR experience in a virtual replica of the physical spa ..."
Abstract - Cited by 6 (3 self) - Add to MetaCart
In order to increase a user’s sense of presence in an artificial environment some researchers propose a gradual transition from reality to the virtual world instead of immersing users into the virtual world directly. One approach is to start the VR experience in a virtual replica of the physical

Probabilistic Verification of Discrete Event Systems using Acceptance Sampling

by Håkan L. S. Younes, H˚akan L. S. Younes, Reid G. Simmons - In Proc. 14th International Conference on Computer Aided Verification, volume 2404 of LNCS , 2002
"... We propose a model independent procedure for verifying properties of discrete event systems. The dynamics of such systems can be very complex, making them hard to analyze, so we resort to methods based on Monte Carlo simulation and statistical hypothesis testing. The verification is probabilistic in ..."
Abstract - Cited by 124 (9 self) - Add to MetaCart
We propose a model independent procedure for verifying properties of discrete event systems. The dynamics of such systems can be very complex, making them hard to analyze, so we resort to methods based on Monte Carlo simulation and statistical hypothesis testing. The verification is probabilistic

Reliable and Fast Detection of Gradual Events in Wireless Sensor Networks

by Liping Peng, Hong Gao, Jianzhong Li, Shengfei Shi, Boduo Li
"... Abstract. Event detection is among the most important applications of wireless sensor networks. Due to the fact that sensor readings do not always represent the true attribute values, previous literatures suggested threshold-based voting mechanism which involves collecting votes of all neighbors to ..."
Abstract - Add to MetaCart
to disambiguate node failures from events, instead of reporting an event directly based on the judgement of single sensor node. Although such mechanism significantly reduces false positives, it inevitably introduces false negatives which lead to a detection delay under the scenario of gradual events

An Incremental Approach to Modeling Flexible Workflows Using Activity Decomposition and Gradual Refinement

by Yanrong Jiang, Weihua Li, Jingtao Yang
"... Abstract—For existing workflow models, it is still difficult to take into account both the hierarchical relations among activities and their execution orders at the same time, as well as the dynamic uncertainties of workflow processes. Aiming at these problems, an approach to modeling flexible workf ..."
Abstract - Add to MetaCart
workflow using activity decomposition and incremental refinement is presented. First, the activities as well as their decomposition relationship and the decomposition rules are analyzed to establish an activity decomposition model, where flexible activities, with verifying constraints, are used to package
Next 10 →
Results 1 - 10 of 354
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University