Sciweavers

3909 search results - page 218 / 782
» Extreme Model Checking
Sort
View
ENTCS
2006
112views more  ENTCS 2006»
15 years 3 months ago
Distributed Symbolic Bounded Property Checking
In this paper we describe an algorithm for distributed, BDD-based bounded property checking and its implementation in the verification tool SymC. The distributed algorithm verifie...
Pradeep Kumar Nalla, Roland J. Weiss, Prakash Moha...
CASSIS
2004
Springer
15 years 8 months ago
Modelling Mobility Aspects of Security Policies
Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increa...
Pieter H. Hartel, Pascal van Eck, Sandro Etalle, R...
I3E
2001
196views Business» more  I3E 2001»
15 years 4 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel
APSEC
2005
IEEE
15 years 8 months ago
Exception Handling: An Architecture Model and Utility Support
Exception handling design is an important but difficult subject in software development. In Java software development, the use of checked exceptions exacerbates the difficulty. In...
Yu Chin Cheng, Jung-Sing Jwo
ECMDAFA
2010
Springer
241views Hardware» more  ECMDAFA 2010»
15 years 7 months ago
Detecting Inconsistencies in Multi-View Models with Variability
Multi-View Modeling (MVM) is a common modeling practice that advocates the use of multiple, different and yet related models to represent the needs of diverse stakeholders. Of cruc...
Roberto Erick Lopez-Herrejon, Alexander Egyed