Proposal and Verification of Investigative Versions

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Coinductive Program Verification - Thesis Proposal

Every programming language should have a formal semantics, and sound verification tools. Giving an operational semantics is hardly more difficult than writing an interpreter, but traditional approaches to enabling program verification, such as defining and proving sound an axiomatic semantics, require considerably more sophistication. For maximum confidence, a program verification tool should b...

متن کامل

Internship proposal Modelling and verification of human gait

General presentation From a modelling perspective, human beings can be thought of as physical objects which interact with physical space in ways that are mediated by forces, masses and inertias, and can be described, to first approximation, by ordinary differential equations. To this extent, human beings can be considered as dynamical systems. A major challenge in fields such as robotics, contr...

متن کامل

Position Space Versions of Magueijo-smolin Doubly Special Relativity Proposal and the Problem of Total Momentum

We present and discuss two different possibilities to construct position space version for the Magueijo-Smolin (MS) doubly special relativity proposal. The first possibility is to start from ordinary special relativity and then to define conserved momentum in special way. It generates MS invariant as well as nonlinear MS transformations on the momentum space, leading to consistent picture for o...

متن کامل

Design and formal verification of DZMBE+

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Legal horizons

سال: 2017

ISSN: 2519-2353

DOI: 10.21272/legalhorizons.2017.i6.p74