We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 4,523 results
  1. Proof Logging for the Circuit Constraint

    Proof logging in constraint programming is an approach to certifying a conclusion reached by a solver. To allow for this, different propagators must...
    Matthew J. McIlree, Ciaran McCreesh, Jakob Nordström in Integration of Constraint Programming, Artificial Intelligence, and Operations Research
    Conference paper 2024
  2. A literature review and existing challenges on software logging practices

    Software logging is the practice of recording different events and activities that occur within a software system, which are useful for different...

    Mohamed Amine Batoun, Mohammed Sayagh, ... Heng Li in Empirical Software Engineering
    Article 18 June 2024
  3. Logging and Testing

    Logging is an important aspect of any application and, like many other topics covered by this book, certainly not a concept unique to Serverless...
    Chapter 2023
  4. Synergies and scaling of use case combinations in the field of asset logging and labeling

    The digitalization of the energy sector enables a broad range of new digital use cases and business models. For instance, blockchain-technology can...

    Louisa Wasmeier, Patrick Dossow, Michael Hinterstocker in Energy Informatics
    Article Open access 11 August 2023
  5. SealFSv2: combining storage-based and ratcheting for tamper-evident logging

    Tamper-evident logging is paramount for forensic audits and accountability subsystems. It is based on a forward integrity model: upon intrusion, the...

    Gorka Guardiola-Múzquiz, Enrique Soriano-Salvador in International Journal of Information Security
    Article Open access 06 December 2022
  6. A Blockchain-Based Tamper-Resistant Logging Framework

    Since its introduction in Bitcoin, the blockchain has proven to be a versatile data structure. In its role as an immutable ledger, it has grown...
    Thomas H. Austin, Fabio Di Troia in Silicon Valley Cybersecurity Conference
    Conference paper Open access 2022
  7. Propositional Proof Skeletons

    Modern SAT solvers produce proofs of unsatisfiability to justify the correctness of their results. These proofs, which are usually represented in the...
    Joseph E. Reeves, Benjamin Kiesl-Reiter, Marijn J. H. Heule in Tools and Algorithms for the Construction and Analysis of Systems
    Conference paper Open access 2023
  8. Asset logging in the energy sector: a scalable blockchain-based data platform

    Due to a steeply growing number of energy assets, the increasingly decentralized and segmented energy sector fuels the potential for new digital use...

    Alexander Djamali, Patrick Dossow, ... Lukas Willburger in Energy Informatics
    Article Open access 13 September 2021
  9. Develo** a Novel Digital Forensics Readiness Framework for Wireless Medical Networks Using Specialised Logging

    Wireless Medical Networks (WMNs) have always been a vital component for the treatment and management of chronic diseases. However, the data generated...
    Cephas Mpungu, Carlisle George, Glenford Mapp in Cybersecurity in the Age of Smart Societies
    Conference paper 2023
  10. Blockchain-based tamper-proof and transparent investigation model for cloud VMs

    In cloud forensics, ensuring the integrity of the evidence such that it is admissible in a court of law is essential. There is always a possibility...

    Pranitha Sanda, Digambar Pawar, V. Radha in The Journal of Supercomputing
    Article 25 May 2022
  11. Certified MaxSAT Preprocessing

    Building on the progress in Boolean satisfiability (SAT) solving over the last decades, maximum satisfiability (MaxSAT) has become a viable approach...
    Hannes Ihalainen, Andy Oertel, ... Jakob Nordström in Automated Reasoning
    Conference paper Open access 2024
  12. A Resolution Proof System for Dependency Stochastic Boolean Satisfiability

    Dependency stochastic Boolean satisfiability (DSSAT), which generalizes stochastic Boolean satisfiability (SSAT) and dependency quantified Boolean...

    Yun-Rong Luo, Che Cheng, Jie-Hong R. Jiang in Journal of Automated Reasoning
    Article 03 August 2023
  13. Deep specification and proof preservation for the CoqTL transformation language

    Executable engines for relational model-transformation languages evolve continuously because of language extension, performance improvement and bug...

    Zheng Cheng, Massimo Tisi in Software and Systems Modeling
    Article 03 May 2022
  14. Certified Core-Guided MaxSAT Solving

    In the last couple of decades, developments in SAT-based optimization have led to highly efficient maximum satisfiability (MaxSAT) solvers, but in...
    Jeremias Berg, Bart Bogaerts, ... Dieter Vandesande in Automated Deduction – CADE 29
    Conference paper Open access 2023
  15. Certifying MIP-Based Presolve Reductions for  \(0\) – \(1\) Integer Linear Programs

    It is well known that reformulating the original problem can be crucial for the performance of mixed-integer programming (MIP) solvers. To ensure...
    Conference paper 2024
  16. Respondent Behavior Logging: A Design Science Research Inquiry into Web Survey Paradata

    This paper introduces a framework for Respondent Behavior Logging (RBL), consisting of static and dynamic models that conceptualize respondent...
    Mohammad Hafijur Rahman, Jonas Sjöström in The Next Wave of Sociotechnical Design
    Conference paper 2021
  17. Three Attacks on Proof-of-Stake Ethereum

    Recently, two attacks were presented against Proof-of-Stake (PoS) Ethereum: one where short-range reorganizations of the underlying consensus chain...
    Caspar Schwarz-Schilling, Joachim Neu, ... David Tse in Financial Cryptography and Data Security
    Conference paper 2022
  18. Implementation of real estate contract system using zero knowledge proof algorithm based blockchain

    A real estate contract is a high-risk contract with a large amount of money, and there are many problems in the risk and reliability of fraud. In...

    SoonHyeong Jeong, Byeongtae Ahn in The Journal of Supercomputing
    Article 30 March 2021
  19. QMaxSATpb: A Certified MaxSAT Solver

    While certification has been successful in the context of satisfiablity solving, with most state-of-the-art solvers now able to provide proofs of...
    Dieter Vandesande, Wolf De Wulf, Bart Bogaerts in Logic Programming and Nonmonotonic Reasoning
    Conference paper 2022
  20. Preprocessing of Propagation Redundant Clauses

    The propagation redundant (PR) proof system generalizes the resolution and resolution asymmetric tautology proof systems used by conflict-driven...

    Joseph E. Reeves, Marijn J. H. Heule, Randal E. Bryant in Journal of Automated Reasoning
    Article Open access 14 September 2023
Did you find what you were looking for? Share feedback.