نتایج جستجو برای: Formal methods

تعداد نتایج: 1971744  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :Electronic Notes in Theoretical Computer Science 1999

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده حقوق 1389

abstract the third millennium has started, but the world is facing with serious challenges in achieving international security and peace. various human rights violations have lead the states to find means to protect human rights. also article 55 of the united nations charter introduces the respect to human rights and fundamental freedom as the most suitable ways to realize peace and security. ...

Journal: :Software 2022

Empirical studies on formal methods and tools are rare. In this paper, we provide guidelines for such studies. We mention their main ingredients then define nine different study strategies (usability testing, laboratory experiments with software human subjects, case studies, qualitative surveys, judgement systematic literature reviews, mapping studies) discuss each of them crucial characteristi...

2005

It's coming again, the new collection that this site has. To complete your curiosity, we offer the favorite fm 2005 formal methods international symposium of formal methods europe newcastle uk july 18 22 book as the choice today. This is a book that will show you even new to old thing. Forget it; it will be right for you. Well, when you are really dying of fm 2005 formal methods international s...

Journal: :Science of Computer Programming 2002

Journal: :IEEE Security & Privacy 2022

This special issue of IEEE Security & Privacy offers some experience how the formal methods (FM) community, working in partnership with sponsors and users, is achieving a broader use this critical technology at increasing levels scale. Formal have rich history spanning half-century. Mathematical proofs properties programs been sought since early days computing. Despite these aspirations, FMs no...

1998
Anthony Hall

In this paper I examine what industry really needs from formal specification techniques. I first describe the background to our use of formal techniques. I then look at the role of formal specifications in development and consider what are the important questions that need to be asked. I illustrate these with some practical experience on industrial projects and conclude with some lessons we hav...

2017

In developing a theory of the rst appropriation of natural resources from the state of nature John Locke tells us that persons must leave enough and as good for others. Detailing exactly what this restriction requires divides right and left libertarians. Brie y, right libertarians interpret enough and as good as requiring no or very minimal restrictions on the rst appropriation of natural resou...

2007
Pamela Zave

This paper explores the close relationship between feature-oriented and architectural styles of formal system description, and explains the formal methods needed to support descriptions in these styles. In the telecommunications domain, DFC is a successful example of a feature-oriented, architectural description technique. Although formal methods for DFC are in their infancy, there are already ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید