Sciweavers

4340 search results - page 747 / 868
» Formal Methods and Cryptography
Sort
View
FM
2009
Springer
163views Formal Methods» more  FM 2009»
15 years 9 months ago
Analysis of a Clock Synchronization Protocol for Wireless Sensor Networks
We study a clock synchronization protocol for the Chess WSN. First, we model the protocol as a network of timed automata and verify various instances using the Uppaal model checker...
Faranak Heidarian, Julien Schmaltz, Frits W. Vaand...
FM
2009
Springer
95views Formal Methods» more  FM 2009»
15 years 9 months ago
On the Complexity of Synthesizing Relaxed and Graceful Bounded-Time 2-Phase Recovery
The problem of enforcing bounded-time 2-phase recovery in real-time programs is often necessitated by conflict between faulttolerance requirements and timing constraints. In this ...
Borzoo Bonakdarpour, Sandeep S. Kulkarni
SBMF
2009
Springer
126views Formal Methods» more  SBMF 2009»
15 years 9 months ago
Undecidability Results for Distributed Probabilistic Systems
Abstract. In the verification of concurrent systems involving probabilities, the aim is to find out the maximum/minimum probability that a given event occurs (examples of such ev...
Sergio Giro
AIME
2001
Springer
15 years 9 months ago
NasoNet, Joining Bayesian Networks and Time to Model Nasopharyngeal Cancer Spread
Abstract. Cancer spread is a non-deterministic dynamic process. As a consequence, the design of an assistant system for the diagnosis and prognosis of the extent of a cancer should...
Severino F. Galán, Francisco Aguado, Franci...
CAISE
2001
Springer
15 years 9 months ago
Using UML Action Semantics for Executable Modeling and Beyond
The UML lacks precise and formal foundations for several constructs such as transition guards or method bodies, for which it resorts to semantic loopholes in the form of “uninter...
Gerson Sunyé, François Pennaneac'h, ...