Sciweavers

237 search results - page 39 / 48
» Automating Refinement Checking in Probabilistic System Desig...
Sort
View
132
Voted
LICS
1999
IEEE
15 years 7 months ago
Proof Techniques for Cryptographic Processes
Contextual equivalences for cryptographic process calculi, like the spi-calculus, can be used to reason about correctness of protocols, but their definition suffers from quantific...
Michele Boreale, Rocco De Nicola, Rosario Pugliese
272
Voted
SPIN
2012
Springer
13 years 5 months ago
Counterexample Explanation by Anomaly Detection
Since counterexamples generated by model checking tools are only symptoms of faults in the model, a significant amount of manual work is required in order to locate the fault that...
Stefan Leue, Mitra Tabaei Befrouei
144
Voted
ANLP
1994
101views more  ANLP 1994»
15 years 4 months ago
Sublanguage Engineering In The Fog System
FoG currently produces bilingual marine and public weather forecasts at several Canadian weather offices. The system is engineered to reflect "good professional style" a...
Richard I. Kittredge, Eli Goldberg, Myunghee Kim, ...
113
Voted
DGO
2008
135views Education» more  DGO 2008»
15 years 4 months ago
Florida Public Hurricane Loss Model (FPHLM): research experience in system integration
The Florida Public Hurricane Loss Model (FPHLM) developed in the State of Florida offers an open, public and effective tool for the government to regulate the insurance ratemaking...
Shu-Ching Chen, Min Chen, Na Zhao, Shahid Hamid, K...
114
Voted
DAC
2000
ACM
16 years 3 months ago
COSY communication IP's
The Esprit/OMI-COSY project defines transaction-levels to set-up the exchange of IP's in separating function from architecture and body-behavior from proprietary interfaces. ...
Erwin A. de Kock, Frédéric Pé...