Sciweavers

612 search results - page 28 / 123
» Bounded model checking for knowledge and real time
Sort
View
ICDCS
2008
IEEE
15 years 7 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
141
Voted
VLSID
2010
IEEE
155views VLSI» more  VLSID 2010»
14 years 10 months ago
Synchronized Generation of Directed Tests Using Satisfiability Solving
Directed test generation is important for the functional verification of complex system-on-chip designs. SAT based bounded model checking is promising for counterexample generatio...
Xiaoke Qin, Mingsong Chen, Prabhat Mishra
QEST
2006
IEEE
15 years 6 months ago
Safe On-The-Fly Steady-State Detection for Time-Bounded Reachability
The time-bounded reachability problem for continuoustime Markov chains (CTMCs) amounts to determine the probability to reach a (set of) goal state(s) within a given time span, suc...
Joost-Pieter Katoen, Ivan S. Zapreev
117
Voted
DAC
2008
ACM
16 years 1 months ago
Model checking based analysis of end-to-end latency in embedded, real-time systems with clock drifts
End-to-end latency of messages is an important design parameter that needs to be within specified bounds for the correct functioning of distributed real-time control systems. In t...
Swarup Mohalik, A. C. Rajeev, Manoj G. Dixit, S. R...
131
Voted
ECRTS
2005
IEEE
15 years 6 months ago
A Space-Optimal Wait-Free Real-Time Synchronization Protocol
We present a wait-free protocol for the single-writer, multiple-reader problem in small-memory, embedded real-time systems. We analytically establish that our protocol requires le...
Hyeonjoong Cho, Binoy Ravindran, E. Douglas Jensen