Sciweavers

17 search results - page 3 / 4
» atva 2005
Sort
View
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
13 years 11 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli
ATVA
2005
Springer
109views Hardware» more  ATVA 2005»
13 years 11 months ago
A New Reachability Algorithm for Symmetric Multi-processor Architecture
Partitioned BDD-based algorithms have been proposed in the literature to solve the memory explosion problem in BDD-based verification. A naive parallelization of such algorithms ...
Debashis Sahoo, Jawahar Jain, Subramanian K. Iyer,...
ATVA
2005
Springer
80views Hardware» more  ATVA 2005»
13 years 11 months ago
Syntactical Colored Petri Nets Reductions
Abstract. In this paper, we develop a syntactical version of elaborated reductions for high-level Petri nets. These reductions simplify the model by merging some sequential transit...
Sami Evangelista, Serge Haddad, Jean-Franço...
ATVA
2005
Springer
131views Hardware» more  ATVA 2005»
13 years 11 months ago
An MTBDD-Based Implementation of Forward Reachability for Probabilistic Timed Automata
Multi-Terminal Binary Decision Diagrams (MTBDDs) have been successfully applied in symbolic model checking of probabilistic systems. In this paper we propose an encoding method for...
Fuzhi Wang, Marta Z. Kwiatkowska
ATVA
2005
Springer
132views Hardware» more  ATVA 2005»
13 years 11 months ago
Flat Counter Automata Almost Everywhere!
Abstract. This paper argues that flatness appears as a central notion in the verification of counter automata. A counter automaton is called flat when its control graph can be ...
Jérôme Leroux, Grégoire Sutre