Sciweavers

1138 search results - page 55 / 228
» First-Order Model Checking Problems Parameterized by the Mod...
Sort
View
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
15 years 11 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
ADBIS
2001
Springer
112views Database» more  ADBIS 2001»
15 years 9 months ago
Detecting Termination of Active Database Rules Using Symbolic Model Checking
One potential problem of active database applications is the non-termination of rules. Although algorithms have been proposed to detect non-termination, almost all provide a conser...
Indrakshi Ray, Indrajit Ray
QEST
2009
IEEE
15 years 11 months ago
Simulation-Based CTMC Model Checking: An Empirical Evaluation
This paper provides an experimental study of the efficiency of simulation-based model-checking algorithms for continuous-time Markov chains by comparing: MRMC – the only tool t...
Joost-Pieter Katoen, Ivan S. Zapreev
AAAI
2010
15 years 6 months ago
Dominance Testing via Model Checking
Dominance testing, the problem of determining whether an outcome is preferred over another, is of fundamental importance in many applications. Hence, there is a need for algorithm...
Ganesh Ram Santhanam, Samik Basu, Vasant Honavar
RTSS
1995
IEEE
15 years 8 months ago
Compositional and Symbolic Model-Checking of Real-Time Systems
E cient automatic model-checking algorithms for real-time systems have been obtained in recent years based on the state-region graph technique of Alur, Courcoubetis and Dill. Howe...
Kim Guldstrand Larsen, Paul Pettersson, Wang Yi