Sciweavers

FSEN
2007
Springer
13 years 11 months ago
Is Your Security Protocol on Time ?
Abstract. In this paper we offer a novel methodology for verifying correctness of (timed) security protocols. The idea consists in computing the time of a correct execution of a s...
Gizela Jakubowska, Wojciech Penczek
FSEN
2007
Springer
13 years 11 months ago
Adapting the UPPAAL Model of a Distributed Lift System
Abstract. Groote, Pang and Wouters (2001) analyzed an existing distributed lift system using the process algebraic toolset µCRL. Pang, Karstens and Fokkink (2003) analyzed a redes...
Wan Fokkink, Allard Kakebeen, Jun Pang
FSEN
2007
Springer
13 years 11 months ago
A Model of Component-Based Programming
Abstract. Component-based programming is about how to create application programs from prefabricated components with new software that provides both glue between the components, an...
Xin Chen, Jifeng He, Zhiming Liu, Naijun Zhan
FSEN
2007
Springer
13 years 11 months ago
Slicing Abstractions
Ingo Brückner, Klaus Dräger, Bernd Finkb...
FSEN
2007
Springer
13 years 11 months ago
A Behavioural Congruence for Web Services
Web services are emerging as a promising technology for the development of next generation distributed heterogeneous software systems. We define a new behavioural equivalence for ...
Filippo Bonchi, Antonio Brogi, Sara Corfini, Fabio...
FSEN
2007
Springer
13 years 11 months ago
Type Abstractions of Name-Passing Processes
Lucia Acciai, Michele Boreale
FSEN
2007
Springer
13 years 11 months ago
Zone-Based Universality Analysis for Single-Clock Timed Automata
Abstract. During the last years, timed automata have become a popular model for describing the behaviour of real-time systems. In particular, there has been much research on proble...
Parosh Aziz Abdulla, Joël Ouaknine, Karin Qua...