Sciweavers

1728 search results - page 83 / 346
» Formal Modeling of Process Migration
Sort
View
ENTCS
2006
173views more  ENTCS 2006»
14 years 11 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
62
Voted
ET
2007
67views more  ET 2007»
14 years 11 months ago
A Formal Analysis of Fault Diagnosis with D-matrices
As new approaches and algorithms are developed for system diagnosis, it is important to reflect on existing approaches to determine their strengths and weaknesses. Of concern is i...
John W. Sheppard, S. G. W. Butcher
92
Voted
AMAST
2008
Springer
15 years 1 months ago
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols
A simple type confusion attack occurs in a security protocol, when a principal interprets data of one type as data of another. These attacks can be successfully prevented by \taggi...
Han Gao, Chiara Bodei, Pierpaolo Degano
CMOT
2011
14 years 2 months ago
A generic architecture for redesign of organizations triggered by changing environmental circumstances
Artificial Intelligence has contributed (formal) design models and software support tools to application areas such as architecture, engineering and software design. This paper exp...
Mark Hoogendoorn, Catholijn M. Jonker, Jan Treur
FM
2009
Springer
153views Formal Methods» more  FM 2009»
14 years 8 months ago
Iterative Refinement of Reverse-Engineered Models by Model-Based Testing
Abstract. This paper presents an iterative technique to accurately reverseengineer models of the behaviour of software systems. A key novelty of the approach is the fact that it us...
Neil Walkinshaw, John Derrick, Qiang Guo