Sciweavers

LICS
2007
IEEE
13 years 11 months ago
The Cost of Punctuality
In an influential paper titled “The Benefits of Relaxing Punctuality” [2], Alur, Feder, and Henzinger introduced Metric Interval Temporal Logic (MITL) as a fragment of the r...
Patricia Bouyer, Nicolas Markey, Joël Ouaknin...
IPPS
2007
IEEE
13 years 11 months ago
FixD : Fault Detection, Bug Reporting, and Recoverability for Distributed Applications
Model checking, logging, debugging, and checkpointing/recovery are great tools to identify bugs in small sequential programs. The direct application of these techniques to the dom...
Cristian Tapus, David A. Noblet
IPPS
2007
IEEE
13 years 11 months ago
J-Sim: An Integrated Environment for Simulation and Model Checking of Network Protocols
In this paper, we report our work [24, 26] on extending the J-Sim network simulator [13] to be an integrated environment for both simulation and model checking of network protocol...
Ahmed Sobeih, Mahesh Viswanathan, Darko Marinov, J...
ICECCS
2007
IEEE
118views Hardware» more  ICECCS 2007»
13 years 11 months ago
Parallel Model Checking and the FMICS-jETI Platform
In this paper we summarize parallel algorithms for enumerative model checking of properties formulated in linear time temporal logic (LTL) as well as a fragment of the µcalculus ...
Jiri Barnat, Lubos Brim, Martin Leucker
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
13 years 11 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
DATE
2007
IEEE
165views Hardware» more  DATE 2007»
13 years 11 months ago
Boosting the role of inductive invariants in model checking
This paper focuses on inductive invariants in unbounded model checking to improve efficiency and scalability. First of all, it introduces optimized techniques to speedup the comp...
Gianpiero Cabodi, Sergio Nocco, Stefano Quer
TASE
2008
IEEE
13 years 11 months ago
Bounded Model Checking of Compositional Processes
Verification techniques like SAT-based bounded model checking have been successfully applied to a variety of system models. Applying bounded model checking to compositional proce...
Jun Sun 0001, Yang Liu 0003, Jin Song Dong, Jing S...
TASE
2008
IEEE
13 years 11 months ago
PDL over Accelerated Labeled Transition Systems
We present a thorough study of Propositional Dynamic Logic over a variation of labeled transition systems, called accelerated labelled transition systems, which are transition sys...
Taolue Chen, Jaco van de Pol, Yanjing Wang
SCAM
2008
IEEE
13 years 11 months ago
Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking
Ensuring the correctness and reliability of software systems is one of the main problems in software development. Model checking, a static analysis method, is preponderant in impr...
Lei Wang, Qiang Zhang, PengChao Zhao
KBSE
2008
IEEE
13 years 11 months ago
Swarm Verification
Reportedly, supercomputer designer Seymour Cray once said that he would sooner use two strong oxen to plow a field than a thousand chickens. Although this is undoubtedly wise when...
Gerard J. Holzmann, Rajeev Joshi, Alex Groce