Sciweavers

297 search results - page 1 / 60
» Model Checking Guarded Protocols
Sort
View
LICS
2003
IEEE
13 years 9 months ago
Model Checking Guarded Protocols
E. Allen Emerson, Vineet Kahlon
AMAST
2004
Springer
13 years 9 months ago
On Guard: Producing Run-Time Checks from Integrity Constraints
Abstract. Software applications are inevitably concerned with data integrity, whether the data is stored in a database, files, or program memory. An integrity guard is code execut...
Michael Benedikt, Glenn Bruns
FMCAD
2008
Springer
13 years 5 months ago
Automatic Non-Interference Lemmas for Parameterized Model Checking
Parameterized model checking refers to any method that extends traditional, finite-state model checking to handle systems arbitrary number of processes. One popular approach to thi...
Jesse D. Bingham
FSEN
2009
Springer
13 years 8 months ago
Specification and Validation of Behavioural Protocols in the rCOS Modeler
The rCOS modeler implements the requirements modelling phase of a model driven component-based software engineering process. Components are specified in rCOS, a relational calculus...
Zhenbang Chen, Charles Morisset, Volker Stolz
EVOW
2006
Springer
13 years 8 months ago
BeeHiveGuard: A Step Towards Secure Nature Inspired Routing Algorithms
Abstract. Nature inspired routing protocols for fixed and mobile networks are becoming an active area of research. However, analyzing their security threats and countering them hav...
Horst Wedde, Constantin Timm, Muddassar Farooq