Sciweavers

2488 search results - page 98 / 498
» An improvement in formal verification
Sort
View
94
Voted
ICDCSW
2000
IEEE
15 years 4 months ago
Compositional Verification of a Third Generation Mobile Communication Protocol
Model-checking has turned out to be an efficient and relatively easy-to-use technique in the verification of formally described programs. However, there is one major drawback in u...
Sari Leppänen, Matti Luukkainen
102
Voted
FMCAD
2008
Springer
15 years 2 months ago
Recording Synthesis History for Sequential Verification
Performing synthesis and verification in isolation has two undesirable consequences: (1) verification runs the risk of becoming intractable, and (2) strong sequential optimization...
Alan Mishchenko, Robert K. Brayton
93
Voted
IFIP8
2007
15 years 2 months ago
A Hybrid Approach for Business Process Verification
Business Process Verification (BPV) is increasingly important in emerging BPM Systems. Although many approaches related to BPV exist, the gap between formal models defined in previ...
Bing Li, Junichi Iijima
86
Voted
COMCOM
2000
97views more  COMCOM 2000»
15 years 16 days ago
Verification of security protocols using LOTOS-method and application
We explain how the formal language LOTOS can be used to specify security protocols and cryptographic operations. We describe how security properties can be modelled as safety prop...
Guy Leduc, François Germeau
95
Voted
KBSE
1995
IEEE
15 years 4 months ago
Classification and Retrieval of Reusable Components Using Semantic Features
cation at some level of abstraction, abandoning the semantic information provided by the specification. In this paper, we propose a methodology that ships the overhead of formal re...
John Penix, Phillip Baraona, Perry Alexander