Sciweavers

3909 search results - page 342 / 782
» Extreme Model Checking
Sort
View
FM
2008
Springer
171views Formal Methods» more  FM 2008»
15 years 5 months ago
Assume-Guarantee Verification for Interface Automata
Interface automata provide a formalism capturing the high level interactions between software components. Checking compatibility, and other safety properties, in an automata-based ...
Michael Emmi, Dimitra Giannakopoulou, Corina S. Pa...
ATVA
2010
Springer
163views Hardware» more  ATVA 2010»
15 years 4 months ago
Automatic Generation of History-Based Access Control from Information Flow Specification
This paper proposes a method for automatically inserting check statements for access control into a given recursive program according to a given security specification. A history-b...
Yoshiaki Takata, Hiroyuki Seki
ENTCS
2006
114views more  ENTCS 2006»
15 years 4 months ago
Prototyping SOS Meta-theory in Maude
We present a prototype implementation of SOS meta-theory in the Maude term rewriting language. The prototype defines the basic concepts of SOS meta-theory (e.g., transition formul...
Mohammad Reza Mousavi, Michel A. Reniers
FAC
2007
90views more  FAC 2007»
15 years 4 months ago
Responsiveness and stable revivals
Individual components in an inter-operating system require assurance from other components both of appropriate functionality and of suitable responsiveness. We have developed prope...
Joy N. Reed, A. W. Roscoe, J. E. Sinclair
CISS
2011
IEEE
14 years 7 months ago
Secret key generation through OFDM multipath channel
—We analyze the fundamental limits of key generation and describe an implementation based on error correcting codes. We show that key extraction based on channel coefficients si...
Yanpei Liu, Stark C. Draper, Akbar M. Sayeed