Sciweavers

790 search results - page 105 / 158
» A Model Checking Language for Concurrent Value-Passing Syste...
Sort
View
SIGSOFT
2007
ACM
16 years 18 days ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
JAVA
2001
Springer
15 years 4 months ago
Runtime optimizations for a Java DSM implementation
Jackal is a fine-grained distributed shared memory implementation of the Java programming language. Jackal implements Java’s memory model and allows multithreaded Java programs...
Ronald Veldema, Rutger F. H. Hofman, Raoul Bhoedja...
TACAS
2004
Springer
122views Algorithms» more  TACAS 2004»
15 years 5 months ago
A Scalable Incomplete Test for the Boundedness of UML RT Models
Abstract. We describe a scalable incomplete boundedness test for the communication buffers in UML RT models. UML RT is a variant of the UML modeling language, tailored to describin...
Stefan Leue, Richard Mayr, Wei Wei
HICSS
2002
IEEE
132views Biometrics» more  HICSS 2002»
15 years 4 months ago
Modeling Current Events
Enormous amounts of information are produced every day, all over the world. but very little of it is true. In this paper, we describe the modeling component of a current events an...
Christopher Landauer, Kirstie L. Bellman
WOSP
2000
ACM
15 years 4 months ago
Quantitative system evaluation with DSPNexpress 2000
This paper describes the software package DSPNexpress 2000, a tool for the quantitative evaluation of systems specified in stochastic Petri nets, the Unified Modeling Language (UM...
Christoph Lindemann, Axel Thümmler, Alexander...