Zobrazeno 1 - 10
of 426
pro vyhledávání: '"Bernhard Beckert"'
Publikováno v:
IET Cyber-Physical Systems, Vol 6, Iss 4, Pp 193-207 (2021)
Abstract The dependability characteristic of the control software of manufacturing systems is highlighted more than before, going through repeated changes to cope with various and varying requirements. Formal methods are researched to be applied to a
Externí odkaz:
https://doaj.org/article/f2d603309a134cd29e935e7d09bb0a4c
Autor:
Mihai Herda, Michael Kirsten, Etienne Brunner, Joana Plewnia, Ulla Scheler, Chiara Staudenmaier, Benedikt Wagner, Pascal Zwick, Bernhard Beckert
Publikováno v:
Electronic Proceedings in Theoretical Computer Science, Vol 296, Iss Proc. HCVS/PERR 2019, Pp 6-13 (2019)
Software verification is a tedious process that involves the analysis of multiple failed verification attempts, and adjustments of the program or specification. This is especially the case for complex requirements, e.g., regarding security or fairnes
Externí odkaz:
https://doaj.org/article/5377181ba45c4c6096e6ca8ad8716f54
Autor:
Bernhard Beckert, Timo Bingmann, Moritz Kiefer, Peter Sanders, Mattias Ulbrich, Alexander Weigl
Publikováno v:
Electronic Proceedings in Theoretical Computer Science, Vol 268, Iss Proc. MARS/VPT 2018, Pp 185-199 (2018)
Distributed programs are often formulated in popular functional frameworks like MapReduce, Spark and Thrill, but writing efficient algorithms for such frameworks is usually a non-trivial task. As the costs of running faulty algorithms at scale can be
Externí odkaz:
https://doaj.org/article/226f178990cf41a5b6f33d97620ea1ba
Publikováno v:
Computer Security. ESORICS 2022 International Workshops ISBN: 9783031254598
Online elections and polls are increasingly gaining ground. Since the beginning of the pandemic, many associations, companies and agencies opted for online elections at some point. Yet, most of these elections use online voting systems that are a bla
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bbdde62ff2137bc62aaf8d05f917764d
https://publikationen.bibliothek.kit.edu/1000158019
https://publikationen.bibliothek.kit.edu/1000158019
Publikováno v:
Electronic Proceedings in Theoretical Computer Science, Vol 167, Iss Proc. UITP 2014, Pp 4-13 (2014)
In recent years the effectiveness of interactive theorem provers has increased to an extent that the bottleneck in the interactive process shifted to efficiency: while in principle large and complex theorems are provable (effectiveness), it takes a l
Externí odkaz:
https://doaj.org/article/9b43361fbc5c436697aa0a92bcb88f14
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031177149
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7a0a69b715767e8090387662d0fa3fcd
https://doi.org/10.1007/978-3-031-17715-6_2
https://doi.org/10.1007/978-3-031-17715-6_2
Publikováno v:
Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering ISBN: 9783031197550
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ed378e2ced583396358d25a2b6155423
https://doi.org/10.1007/978-3-031-19756-7_16
https://doi.org/10.1007/978-3-031-19756-7_16
Publikováno v:
Electronic Proceedings in Theoretical Computer Science, Vol 102, Iss Proc. SSV 2012, Pp 18-32 (2012)
Software verification tools have become a lot more powerful in recent years. Even verification of large, complex systems is feasible, as demonstrated in the L4.verified and Verisoft XT projects. Still, functional verification of large software system
Externí odkaz:
https://doaj.org/article/2b653621c927404dbff3ab2a4387cd10
Publikováno v:
INDIN
Cyber Physical Production Systems (CPPS) operate for a long time and face continuous and incremental changes to follow up varying requirements. Interdisciplinary engineering of CPPS is often subject to delay and cost overrun; and quality control may
Autor:
Sebastian Friebe, Bernhard Beckert, Matthias Grundmann, Oliver Stengele, Marc Leinweber, Jonas Schiffl
Publikováno v:
SACMAT
Ethereum is a platform for deploying smart contracts, which due to their public nature and the financial value of the assets they manage are attractive targets for attacks. With asset management as a main task of smart contracts, access control aspec