Sciweavers

16 search results - page 3 / 4
» Fighting State Space Explosion: Review and Evaluation
Sort
View
WSC
2004
13 years 7 months ago
Fast Model-Based Penetration Testing
Traditional approaches to security evaluation have been based on penetration testing of real systems, or analysis of formal models of such systems. The former suffer from the prob...
Sankalp Singh, James Lyons, David M. Nicol
SAFECOMP
2010
Springer
13 years 4 months ago
Reliability Analysis of Safety-Related Communication Architectures
Abstract. In this paper we describe a novel concept for reliability analysis of communication architectures in safety-critical systems. This concept has been motivated by applicati...
Oliver Schulz, Jan Peleska
DAC
2005
ACM
14 years 6 months ago
Multi-threaded reachability
Partitioned BDD-based algorithms have been proposed in the literature to solve the memory explosion problem in BDD-based verification. Such algorithms can be at times ineffective ...
Debashis Sahoo, Jawahar Jain, Subramanian K. Iyer,...
VALUETOOLS
2006
ACM
164views Hardware» more  VALUETOOLS 2006»
13 years 11 months ago
Analysis of Markov reward models using zero-suppressed multi-terminal BDDs
High-level stochastic description methods such as stochastic Petri nets, stochastic UML statecharts etc., together with specifications of performance variables (PVs), enable a co...
Kai Lampka, Markus Siegle
JMLR
2006
124views more  JMLR 2006»
13 years 5 months ago
Policy Gradient in Continuous Time
Policy search is a method for approximately solving an optimal control problem by performing a parametric optimization search in a given class of parameterized policies. In order ...
Rémi Munos