Data verification

Results: 958



#Item
71

Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size Jason Franklin, Sagar Chaki, Anupam Datta Carnegie Mellon University Pittsburgh, PA

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-02-12 12:31:57
    72Computer networking / Cache / Named data networking / DNS spoofing / Web cache / Content centric networking / Hypertext Transfer Protocol / Interest Flooding Attack / Forwarding plane / Probability distribution

    Efficient Content Verification in Named Data Networking Dohyung Kim Sunwook Nam Sungkyunkwan University

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2015-10-01 13:11:48
    73

    Position Description Collection Associate The Collection Associate will be responsible for accessioning, processing, verification of accompanying data, cataloguing (computer entry of data), physical deployment of specime

    Add to Reading List

    Source URL: res.cloudinary.com

    Language: English - Date: 2015-10-01 10:05:40
      74Computing / Data types / Software engineering / Computer programming / Abstract data types / Fault-tolerant computer systems / Type theory / Consistency model / Transaction processing / Replication / String / List

      Replicated Data Types: Specification, Verification, Optimality Sebastian Burckhardt Alexey Gotsman Hongseok Yang

      Add to Reading List

      Source URL: software.imdea.org

      Language: English - Date: 2013-11-14 12:44:57
      75Weather forecasting / Statistical forecasting / Precipitation / Forecast skill / Forecasting / Data assimilation / Forecast verification / Quantitative precipitation forecast / WeatherStar

      EUROBRISA products documentation This page (http://eurobrisa.cptec.inpe.br/) presents 1-month lead South America precipitation forecasts and verification products for three month seasons. For example, a forecast issued i

      Add to Reading List

      Source URL: eurobrisa.cptec.inpe.br

      Language: English - Date: 2015-07-24 09:34:34
      76C / Data types / Whiley / Struct / Foreach loop / C++ classes / ALGOL 68 / Union type / Type system / Typedef / C Sharp syntax

      Whiley: a Platform for Research in Software Verification David J. Pearce and Lindsay Groves School of Engineering and Computer Science Victoria University of Wellington

      Add to Reading List

      Source URL: homepages.ecs.vuw.ac.nz

      Language: English - Date: 2013-10-27 00:48:28
      77Weather forecasting / Statistical forecasting / Climate of the United Kingdom / Climate modeling / Forecast verification / European Centre for Medium-Range Weather Forecasts / Data assimilation / Forecasting / Downscaling / Meteorology / Model output statistics / Met Office

      Meteorol. Appl. 13, 73–doi:S1350482705002045 A Bayesian approach for multi-model downscaling: Seasonal forecasting of regional

      Add to Reading List

      Source URL: eurobrisa.cptec.inpe.br

      Language: English - Date: 2014-09-12 10:24:50
      78

      VACID-0: Verification of Ample Correctness of Invariants of Data-structures, Edition 0 K. Rustan M. Leino and Michał Moskal Microsoft Research, Redmond, WA, USA {leino,micmo}@microsoft.com

      Add to Reading List

      Source URL: research.microsoft.com

      Language: English - Date: 2010-07-21 13:15:26
        79Application programming interfaces / Communications protocol / Data transmission / Protocols / Monad / Distributed computing / Operating system / X Window System / Transmission Control Protocol / Computing / Software / Data

        Poster: Contract Verification for Mobile Security Hannah Gommerstadt Frank Pfenning Limin Jia

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2015-05-11 16:42:44
        80Secure communication / Information / Data / Internet protocols / Electronic commerce / HTTP Secure / Electronic voting / JavaScript / X.509 / Cryptographic protocols / Public-key cryptography / Computing

        The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election J. Alex Halderman1 and Vanessa Teague2? arXiv:1504.05646v2 [cs.CR] 5 Jun 2015

        Add to Reading List

        Source URL: arxiv.org

        Language: English - Date: 2015-06-08 06:10:21
        UPDATE