نتایج جستجو برای: verification is not verifiable

تعداد نتایج: 7944505  

Journal: :CoRR 2016
Koksal Mus Mehmet Sabir Kiraz Murat Cenk Isa Sertkaya

After the Estonian Parliamentary Elections held in 2011, an additional verification mechanism was integrated into the i-voting system in order to resist corrupted voting devices, including the so called Student’s Attack where a student practically showed that the voting system is indeed not verifiable by developing several versions of malware capable of blocking or even changing the vote. This ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان 1390

the changes in todays world organization, to the extent that instability can be characterized with the most stable organizations called this afternoon. if you ever change management component, an additional value to the organization was considered, today, these elements become the foundation the organization is survival. the definition of the entrepreneur to identify opportunities to exploit a...

2002
Pao-Ann Hsiung Trong-Yen Lee Win-Bin See Jih-Ming Fu Sao-Jie Chen

Embedded real-time applications are often built from scratch on a trial-and-error basis, which leads to sub-optimal designs with latent errors that are not detectable in early stages of use or deployment and often incurs prolonged time-to-market. A new application framework called Verifiable Embedded Real-Time Application Framework (VERTAF) is proposed for embedded real-time application develop...

Journal: :IACR Cryptology ePrint Archive 2014
James Alderman Christian Janson Carlos Cid Jason Crampton

The combination of software-as-a-service and the increasing use of mobile devices gives rise to a considerable difference in computational power between servers and clients. Thus, there is a desire for clients to outsource the evaluation of complex functions to an external server. Servers providing such a service may be rewarded per computation, and as such have an incentive to cheat by returni...

Journal: :Lecture Notes in Computer Science 2021

Broadbent and Islam (TCC '20) proposed a quantum cryptographic primitive called encryption with certified deletion. In this primitive, receiver in possession of ciphertext can generate classical certificate that the encrypted message is deleted. Although their construction information-theoretically secure, it limited to setting one-time symmetric key (SKE), where sender have share common advanc...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1391

abstract: one of the most visited & important spaces in different countries by tourist are urban areas. the old tehran which major part is located in district 12 is historical showcase of the capital, but, its hiidden cultural attraction is not used as it should be. this thesis occasionally engage in studying the efficacy of correct installation of travel guide boards in welfare & easily acc...

پایان نامه :0 1374

this experimental study has been conducted to test the effect of oral presentation on the development of l2 learners grammar. but this oral presentation is not merely a deductive instruction of grammatical points, in this presentation two hypotheses of krashen (input and low filter hypotheses), stevicks viewpoints on grammar explanation and correction and widdowsons opinion on limited use of l1...

2006
Fang Yu

Compared to test or simulation, formal verification poses an attractive way by either guaranteeing the correctness of the system or generating a counter example to indicate the violation. However, due to state explosion, the power of formal verification is usually restricted to trivial systems. This project is motivated by two observations of Networked Embedded Systems: a) due to limited physic...

2011
George Hagen Ricky Butler Jeffrey Maddalon

In this paper we introduce Stratway, a modular approach to finding long-term strategic resolutions to conflicts between aircraft. The modular approach provides both advantages and disadvantages. Our primary concern is to investigate the implications on the verification of safety-critical properties of a strategic resolution algorithm. By partitioning the problem into verifiable modules much str...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1377

this thesis deals essentially (but not from all aspects) with the extension of the notion of semigroup compactification and the construction of a general theory of semitopological nonaffine (affine) transformation semigroup compactifications. it determines those compactification which are universal with respect to some algebric or topological properties. as an application of the theory, it is i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید