Sciweavers

2004 search results - page 102 / 401
» Comparison of Model Checking Tools for Information Systems
Sort
View
152
Voted
ECMDAFA
2007
Springer
100views Hardware» more  ECMDAFA 2007»
15 years 11 months ago
Reverse Engineering Models from Traces to Validate Distributed Systems - An Industrial Case Study
The paper targets the applicability of model-driven methodologies to the validation of complex systems and presents a case study of a mobile radio network. Validation relies on the...
Andreas Ulrich, Alexandre Petrenko
SACMAT
2009
ACM
15 years 11 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
CIIA
2009
15 years 5 months ago
LCF-style for Secure Verification Platform based on Multiway Decision Graphs
Abstract. Formal verification of digital systems is achieved, today, using one of two main approaches: states exploration (mainly model checking and equivalence checking) or deduct...
Sa'ed Abed, Otmane Aït Mohamed
ETFA
2006
IEEE
15 years 10 months ago
Optimizing Quality of Control in Networked Automation Systems using Probabilistic Models
New technological trends lead to the increasing use of network technologies in automation. Especially the Ethernet with TCP/IP and wireless networks find growing acceptance. The r...
Jürgen Greifeneder, Georg Frey
136
Voted
WAIM
2005
Springer
15 years 10 months ago
An Ontology Based Approach to Construct Behaviors in Web Information Systems
System behaviors specify the major functions of domain specific Web Information Systems (WIS). Traditional techniques can not satisfy various requirements or manage innumerous data...
Lv-an Tang, Hongyan Li, Zhiyong Pan, Dongqing Yang...