Filters








223,601 Hits in 4.0 sec

Proving Non-interference on Reachability Properties: A Refinement Approach

Marc Frappier, Amel Mammar
2011 2011 18th Asia-Pacific Software Engineering Conference  
Since refinement preserves these reachability properties and non-interference, proofs can be conducted on abstract machines rather than implementation code. = any u where P then Z(S 1 )end Operator Z inserts  ...  Indeed, an operation X * J interferes on a path p, defined from ψ to φ, if X * J prevents the path p, starting from ψ, from reaching φ.  ...  One can then show non-interference by proving spec(ψ , φ) Z(p).  ... 
doi:10.1109/apsec.2011.35 dblp:conf/apsec/FrappierM11 fatcat:5nqijnggvbbtvmu46al3q657y4

Automated and Modular Refinement Reasoning for Concurrent Programs [chapter]

Chris Hawblitzel, Erez Petrank, Shaz Qadeer, Serdar Tasiran
2015 Lecture Notes in Computer Science  
We present civl, a language and verifier for concurrent programs based on automated and modular refinement reasoning. civl supports reasoning about a concurrent program at many levels of abstraction.  ...  A novel combination of automata theoretic and logic-based checks is used to verify refinement.  ...  -The GC's higher layers relied primarily on invariant-based non-interference reasoning.  ... 
doi:10.1007/978-3-319-21668-3_26 fatcat:n2eslalhbzfbtbeplhbj65pwju

Proving Abstract Non-interference [chapter]

Roberto Giacobazzi, Isabella Mastroeni
2004 Lecture Notes in Computer Science  
the sign of l.  ...  that c is ρ-observably equivalent to the statement nil: {ρ} L c {ρ} L iff ρ( c (h, l) L ) = ρ(l) PROOF-SYSTEM FOR NARROW NON-INTERFERENCE N : Syntax-driven certification of narrow non-interference for  ...  c {ρ} L , x : H (ρ)while x do c endw(ρ) A7: (η)c(ρ), x : L (η)while x do c endw( Table The The proof-system N N0:  ... 
doi:10.1007/978-3-540-30124-0_23 fatcat:olwgfldkpnbyjjtxbahlarjaa4

Adjoining classified and unclassified information by abstract interpretation

Roberto Giacobazzi, Isabella Mastroeni
2010 Journal of Computer Security  
The completeness model of non-interference provides a deeper insight in the relation between these facets of non-interference, allowing to prove that we cannot minimally characterise which information  ...  This is achieved by interpreting the well known Joshi and Leino's semantic approach to non-interference as a problem of making an abstraction complete relatively to a program's semantics.  ...  On the one hand, we show that when we define non-interference policies, these aspects are completely independent; in particular the characterization of what we have to protect depends on the non-interference  ... 
doi:10.3233/jcs-2009-0382 fatcat:kiyye2mixrfvtjoax6nhkom3n4

Interference Analysis for Dependable Systems Using Refinement and Abstraction [chapter]

Claus Pahl
2002 Lecture Notes in Computer Science  
Refinement and abstraction form the basis for an interference analysis method for security properties and for automated test case generation.  ...  The rigorous analysis of dependable systems specifications is of paramount importance for the reliability and security of these systems.  ...  The author would like to thank the anonymous reviewers for their valuable comments.  ... 
doi:10.1007/3-540-45614-7_19 fatcat:ytatdqup4rgx7chd77rp3n4swe

Bisimulation and Unwinding for Verifying Possibilistic Security Properties [chapter]

Annalisa Bossi, Riccardo Focardi, Carla Piazza, Sabina Rossi
2002 Lecture Notes in Computer Science  
level (internal attacks from, e.g., Trojan horses) Information Flow: avoid any information flow (direct or indirect) from the high (classified) level to the low (untrusted) one Dynamicity: a program which  ...  is in a secure state for a certain environment might become unprotected if the environment suddenly changes Problem: verify, rectify, incrementally build secure processes  ...  what is done at the high level cannot interfere in any way with the low level BNDC [Focardi-Gorrieri'94]: formalized non-interference as Bisimulation-based Non Deducibility on Compositions (BNDC  ... 
doi:10.1007/3-540-36384-x_19 fatcat:wyhmgks475c47peklbbchb5sy4

Modified Anderson-Darling Test-Based Target Detector in Non-Homogenous Environments

Yang Li, Yinsheng Wei, Bingfei Li, Gil Alterovitz
2014 Sensors  
Based on K-sample Anderson-Darling (AD) tests, the method re-arranges the reference cells by merging homogenous sub-blocks surrounding the cell under test (CUT) into a new reference window to estimate  ...  Double partition test, clutter edge refinement and outlier elimination are used as an anti-clutter processor in the proposed Modified AD (MAD) detector.  ...  Acknowledgments This research was supported by the National Natural Science Foundation of China (No. 61102158) and General Financial Grant from the China Postdoctoral Science Foundation (No. 2011M500667  ... 
doi:10.3390/s140916046 pmid:25177800 pmcid:PMC4208161 fatcat:wsaxzc5f5rh7nh6yr4a5ycpdnu

1-Bit Massive MIMO Downlink Based on Constructive Interference

Ang Li, Christos Masouros, A. Lee Swindlehurst
2018 2018 26th European Signal Processing Conference (EUSIPCO)  
Numerical results validate the effectiveness of the proposed refinement method on existing approaches for massive MIMO with 1-bit DACs, and the performance improvements are most significant for the low-complexity  ...  Index Terms-Massive MIMO, 1-bit quantization, refinement, constructive interference.  ...  ACKNOWLEDGMENT This work was supported by the Royal Academy of Engineering, U.K., the Engineering and Physical Sciences Research Council (EPSRC) project EP/M014150/1, the China Scholarship Council (CSC  ... 
doi:10.23919/eusipco.2018.8553556 dblp:conf/eusipco/0003MS18 fatcat:7hekkzz2iverzbtgb23xu4hjf4

Homospin single-chain magnet with 1D ferromagnetic azido-cobalt Ising-type chain

Zuo-Xi Li, Yong-Fei Zeng, Hong Ma, Xian-He Bu
2010 Chemical Communications  
Metal atoms were located from the E-maps and other non-hydrogen atoms were located in successive difference Fourier syntheses and refined with anisotropic thermal parameters on F 2 .  ...  Magnetic data were collected on a Quantum Design MPMS-XL7 superconducting quantum interference device (SQUID) magnetometer equipped with a 5T magnet using crushed crystals of the sample at Nankai University  ...  Metal atoms were located from the E-maps and other non-hydrogen atoms were located in successive difference Fourier syntheses and refined with anisotropic thermal parameters on F 2 .  ... 
doi:10.1039/c0cc03529g pmid:20967351 fatcat:blersh6p3vdolhz2h24lfg53hu

Splitting atoms safely

C.B. Jones
2007 Theoretical Computer Science  
In particular, it takes a fresh look at a number of familiar ideas including the problem of interference. Some subtle issues of observabilityincluding granularity -are explored.  ...  Based on these points, the paper sets out some requirements for an approach to developing systems by "splitting atoms safely".  ...  Add to this the synchronicity of our birthdays being on the same day of the year, and it was just too tempting an invitation.  ... 
doi:10.1016/j.tcs.2006.12.029 fatcat:zw4q6z6mhndjjbxi3yzna6k5da

1-Bit Massive MIMO Downlink Based on Constructive Interference [article]

Ang Li, Christos Masouros, A. Lee Swindlehurst
2018 arXiv   pre-print
Numerical results validate the effectiveness of the proposed refinement method on existing approaches for massive MIMO with 1-bit DACs, and the performance improvements are most significant for the low-complexity  ...  process that is applicable to any existing 1-bit precoding approaches based on the constructive interference (CI) formulation.  ...  ACKNOWLEDGMENT This work was supported by the Royal Academy of Engineering, U.K., the Engineering and Physical Sciences Research Council (EPSRC) project EP/M014150/1, the China Scholarship Council (CSC  ... 
arXiv:1810.12039v1 fatcat:gjzm5tdqajf7rd2jafyfws2h7a

Combinatorial Abstraction Refinement for Feasibility Analysis

Martin Stigge, Wang Yi
2013 2013 IEEE 34th Real-Time Systems Symposium  
One of these problems is static priority schedulability of workload models which are more expressive than the traditional periodic task model.  ...  We extend the approach to non-preemptive schedulers as well as static job-type priorities where jobs of different types in the same task may be assigned different static priorities.  ...  Acknowledgements The authors would like to thank the anonymous reviewers of the RTSS 2013 conference and the Real-Time Systems journal for their constructive comments on the conference version and earlier  ... 
doi:10.1109/rtss.2013.41 dblp:conf/rtss/Stigge013 fatcat:tpez2majo5c2tp4xcuwly5c6nu

Confidentiality-Preserving Refinement is Compositional — Sometimes [chapter]

Thomas Santen, Maritta Heisel, Andreas Pfitzmann
2002 Lecture Notes in Computer Science  
refinement of the larger system.  ...  It turns out that the refinement relation is not composition in general, but the condition for compositionality can be stated in a way that builds on the analysis of subsystems thus aiding system designers  ...  We thank Peter Ryan for extensive and constructive feedback on a previous version of the paper. The anonymous reviewers also provided useful comments.  ... 
doi:10.1007/3-540-45853-0_12 fatcat:4wnvrvnt5fcf3czm64hrtv7tri

New Performance Levels for TPV Front Surface Filters

Thomas D. Rahmlow
2004 AIP Conference Proceedings  
Current development work addresses elimination of the plasma filter and alternate substrates.  ...  Energy and angle weighted spectral efficiencies of ~83% for the 0.52 eV application and ~76% for the 0.60 eV applications were achieved with ~78% angle weighted above bandgap transmission.  ...  Deposition on non-semiconductor substrates and on altered plasma filter substrates is possible.  ... 
doi:10.1063/1.1841893 fatcat:t4ydyz53w5g5vegb7xj2lki2um

Bias Reduction in Phase Refinement by Modified Interference Functions: Introducing the γ Correction

J. P. Abrahams
1997 Acta Crystallographica Section D: Biological Crystallography  
The scale of the bias component, here denoted as '7, is shown to be equal in magnitude to the origin vector of the interference function G that defines the relationships between the structure factors.  ...  Elimination of the bias component of a constrained model, the component insensitive to constraints, enhances the power of phase-refinement techniques.  ...  Most of the intensity of this interference function is around the origin.  ... 
doi:10.1107/s0907444996015272 pmid:15299902 fatcat:p3zw5om4cbdx5bufmwqs5ejqme
« Previous Showing results 1 — 15 out of 223,601 results