Sciweavers

383 search results - page 35 / 77
» Liveness Checking as Safety Checking
Sort
View
96
Voted
CAV
2000
Springer
187views Hardware» more  CAV 2000»
15 years 1 months ago
Combining Decision Diagrams and SAT Procedures for Efficient Symbolic Model Checking
In this paper we show how to do symbolic model checking using Boolean Expression Diagrams (BEDs), a non-canonical representation for Boolean formulas, instead of Binary Decision Di...
Poul Frederick Williams, Armin Biere, Edmund M. Cl...
COMPSEC
2010
146views more  COMPSEC 2010»
14 years 10 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
77
Voted
SRDS
1997
IEEE
15 years 2 months ago
Software Approach to Hazard Detection Using On-line Analysis of Safety Constraints
Hazard situations in safety-critical systems are typically complex, so there is a need for means to detect complex hazards and react in a timely and meaningful way. This paper add...
Beth A. Schroeder, Karsten Schwan, Sudhir Aggarwal
99
Voted
ICFEM
2009
Springer
14 years 8 months ago
Graded-CTL: Satisfiability and Symbolic Model Checking
In this paper we continue the study of a strict extension of the Computation Tree Logic, called graded-CTL, recently introduced by the same authors. This new logic augments the sta...
Alessandro Ferrante, Margherita Napoli, Mimmo Pare...
98
Voted
COMSWARE
2008
IEEE
15 years 4 months ago
A reality check on sip-based streaming applications on the next generation mobile test network
— The telecom and the internet world is converging towards all-IP network architecture and the operators are keen to provide innovative multimedia services coupled with advanced ...
Chitra Balakrishna, Khalid Al-Begain