Sciweavers

714 search results - page 57 / 143
» Certifying Model Checkers
Sort
View
COMCOM
2008
145views more  COMCOM 2008»
14 years 10 months ago
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
ICSE
2007
IEEE-ACM
15 years 10 months ago
SCL: Static Enforcement and Exploration of Developer Intent in Source Code
Developers are often unaware of, or fail to respect, the intentions behind a design due to poor communication of design intent. SCL (Structural Constraint Language) helps develope...
Daqing Hou
CAV
2006
Springer
157views Hardware» more  CAV 2006»
15 years 1 months ago
Lazy Abstraction with Interpolants
traction with Interpolants K. L. McMillan Cadence Berkeley Labs Abstract. We describe a model checker for infinite-state sequential proased on Craig interpolation and the lazy abst...
Kenneth L. McMillan
ENTCS
2006
148views more  ENTCS 2006»
14 years 9 months ago
Towards the Semantics and Verification of BPEL4WS
Abstract. In this paper, we discuss the semantics of BPEL4WS language which is a de facto standard for specifying and execution workflow specification for web service composition a...
Geguang Pu, Xiangpeng Zhao, Shuling Wang, Zongyan ...
IFIP
2009
Springer
14 years 7 months ago
Game-Based Verification of Multi-Party Contract Signing Protocols
A multi-party contract signing (MPCS) protocol is used for a group of signers to sign a digital contract over a network. We analyse the protocols of Mukhamedov and Ryan (MR), and o...
Ying Zhang, Chenyi Zhang, Jun Pang, Sjouke Mauw