Results 11 to 20 of about 192,432 (282)
A recent case study from AWS by Chong et al. proposes an effective methodology for Bounded Model Checking in industry. In this paper, we report on a follow up case study that explores the methodology from the perspective of three research questions: (a) can proof artifacts be used across verification tools; (b) are there bugs in verified code; and (c ...
Siddharth Priya +5 more
openaire +2 more sources
The formalization of biological systems using computational modelling approaches as an alternative to mathematical-based methods has recently received much interest because computational models provide a deeper mechanistic understanding of biological systems.
Savas Konur +2 more
openaire +3 more sources
Verified Verifiers for Verifying Elections [PDF]
The security and trustworthiness of elections is critical to democracy; alas, securing elections is notoriously hard. Powerful cryptographic techniques for verifying the integrity of electronic voting have been developed and are in increasingly common use. The claimed security guarantees of most of these techniques have been formally proved.
Haines, Thomas Edmund +2 more
openaire +2 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Klein, Gerwin, Nipkow, Tobias
openaire +2 more sources
Verifying Controlled Components [PDF]
Recent work on combining CSP and B has provided ways of describing systems comprised of components described in both B (to express requirements on state) and CSP (to express interactive and controller behaviour). This approach is driven by the desire to exploit existing tool support for both CSP and B, and by the need for compositional proof techniques.
Schneider, Steve A., Treharne, Helen
openaire +3 more sources
A Certificateless Verifiable Strong Designated Verifier Signature Scheme
Certificateless strong designated verifier signature schemes have realized the merit of CL-PKC against the traditional strong designated verifier signatures.
Shu Han +8 more
doaj +1 more source
SIGNED: Smart cIty diGital twiN vErifiable Data Framework
Smart city digital twins can provide useful insights by making effective use of multidisciplinary urban data from diverse sources. Whilst these insights provide new information that helps cities in decision making, verifying the authenticity, integrity ...
Zeeshan Pervez +3 more
doaj +1 more source
Standard Breach Remedies, Quality Thresholds, and Cooperative Investments [PDF]
When investments are non-verifiable, inducing cooperative investments with simple contracts may not be as difficult as previously thought. Indeed, modeling 'expectation damages' close to legal practice, we show that the default remedy of contract law ...
Stremitzer, Alexander
core +4 more sources
Introduction: We sought to examine the utility of self-reported pain scale by comparing emergency department (ED) triage pain scores of self-reported but non-verifiable painful conditions with those of verifiable painful conditions using a large ...
K. Tom Xu +2 more
doaj +1 more source
Research on Verifiable Keyword Search over Encrypted Cloud Data:A Survey [PDF]
The convenience and efficiency of cloud computing have brought great potential for its development.More and more enterprises and individuals obtain real benefits by using various outsourcing services provided by cloud computing.In order to protect the ...
ZHOU Qian, DAI Hua, SHENG Wen-jie, HU Zheng, YANG Geng
doaj +1 more source

