Sciweavers

1492 search results - page 100 / 299
» Automatic Software Model Checking Using CLP
Sort
View
ATAL
2008
Springer
15 years 5 days ago
Towards verifying compliance in agent-based web service compositions
We explore the problem of specification and verification of compliance in agent based Web service compositions. We use the formalism of temporal-epistemic logic suitably extended ...
Alessio Lomuscio, Hongyang Qu, Monika Solanki
WCRE
2005
IEEE
15 years 3 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
ATVA
2007
Springer
150views Hardware» more  ATVA 2007»
15 years 2 months ago
3-Valued Circuit SAT for STE with Automatic Refinement
Abstract. Symbolic Trajectory Evaluation (STE) is a powerful technique for hardware model checking. It is based on a 3-valued symbolic simulation, using 0,1 and X n"), where t...
Orna Grumberg, Assaf Schuster, Avi Yadgar
109
Voted
IAT
2010
IEEE
14 years 8 months ago
Modular JADE Agents Design and Implementation Using ASEME
ASEME is an emerging Agent Oriented Software Engineering (AOSE) methodology. The Model-Driven Engineering (MDE) paradigm encourages software modelers to automate the transition of...
Nikolaos I. Spanoudakis, Pavlos Moraitis
CHARME
2005
Springer
136views Hardware» more  CHARME 2005»
15 years 3 months ago
Predictive Reachability Using a Sample-Based Approach
Abstract. Unbounded model checking of invariant properties is typically solved using symbolic reachability. However, BDD based reachability methods suffer from lack of robustness ...
Debashis Sahoo, Jawahar Jain, Subramanian K. Iyer,...