Sciweavers

5255 search results - page 330 / 1051
» Formal Methods for Privacy
Sort
View
ASE
2008
135views more  ASE 2008»
15 years 4 months ago
Deriving event-based transition systems from goal-oriented requirements models
Goal-oriented methods are increasingly popular for elaborating software requirements. They offer systematic support for incrementally building intentional, structural, and operati...
Emmanuel Letier, Jeff Kramer, Jeff Magee, Sebasti&...
SEKE
2005
Springer
15 years 10 months ago
Design an Interoperable Mobile Agent System Based on Predicate Transition Net Models
Mobile agents provide an effective and flexible style to develop advanced distributed systems. In order to promote interoperability and ensure the quality of mobile agent systems,...
Junhua Ding, Dianxiang Xu, Yi Deng, Peter J. Clark...
CAV
2003
Springer
153views Hardware» more  CAV 2003»
15 years 10 months ago
Interpolation and SAT-Based Model Checking
Abstract. We consider a fully SAT-based method of unbounded symbolic model checking based on computing Craig interpolants. In benchmark studies using a set of large industrial circ...
Kenneth L. McMillan
MEMOCODE
2008
IEEE
15 years 11 months ago
Virtual prototyping AADL architectures in a polychronous model of computation
While synchrony and asynchrony are two distinct concepts of concurrency theory, effective and formally defined embedded system design methodologies usually mix the best from both...
Ma Yue, Jean-Pierre Talpin, Thierry Gautier
AGTIVE
2003
Springer
15 years 10 months ago
Meta-Modelling, Graph Transformation and Model Checking for the Analysis of Hybrid Systems
Abstract. This paper presents the role of meta-modelling and graph transformation in our approach for the modelling, analysis and simulation of complex systems. These are made of c...
Juan de Lara, Esther Guerra, Hans Vangheluwe