Sciweavers

20 search results - page 4 / 4
» Stepping forward with interpolants in unbounded model checki...
Sort
View
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 4 months ago
Algorithmic Verification of Single-Pass List Processing Programs
We introduce streaming data string transducers that map input data strings to output data strings in a single left-to-right pass in linear time. Data strings are (unbounded) seque...
Rajeev Alur, Pavol Cerný
CSFW
2002
IEEE
13 years 9 months ago
Capturing Parallel Attacks within the Data Independence Framework
We carry forward the work described in our previous papers [3, 14, 12] on the application of data independence to the model checking of cryptographic protocols using CSP [13] and ...
Philippa J. Broadfoot, A. W. Roscoe
AUSDM
2006
Springer
100views Data Mining» more  AUSDM 2006»
13 years 8 months ago
Data Mining Methodological Weaknesses and Suggested Fixes
Predictive accuracy claims should give explicit descriptions of the steps followed, with access to the code used. This allows referees and readers to check for common traps, and t...
John H. Maindonald
RE
2001
Springer
13 years 9 months ago
The Single Model Principle
at different levels of abstraction. There are two very different ways of using such languages. One approach is based on the manifestation of a single model, with construction of di...
Richard F. Paige, Jonathan S. Ostroff
ENTCS
2007
143views more  ENTCS 2007»
13 years 4 months ago
Formal Fault Tree Analysis - Practical Experiences
Safety is an important requirement for many modern systems. To ensure safety of complex critical systems, well-known safety analysis methods have been formalized. This holds in pa...
Frank Ortmeier, Gerhard Schellhorn