Sciweavers

12981 search results - page 476 / 2597
» Model Checking (Abstract)
Sort
View
195
Voted
EGCDMAS
2004
147views ECommerce» more  EGCDMAS 2004»
15 years 6 months ago
Should We Prove Security Policies Correct?
Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the s...
Sebastiano Battiato, Giampaolo Bella, Salvatore Ri...
154
Voted
ENTCS
2006
172views more  ENTCS 2006»
15 years 5 months ago
Efficient Detection of Conflicts in Graph-based Model Transformation
Using graph transformation as a formalism to specify model transformation, termination and confluence of the graph transformation system are often required properties. Only under ...
Leen Lambers, Hartmut Ehrig, Fernando Orejas
FMSB
2008
199views Formal Methods» more  FMSB 2008»
15 years 6 months ago
Bounded Asynchrony: Concurrency for Modeling Cell-Cell Interactions
We introduce bounded asynchrony, a notion of concurrency tailored to the modeling of biological cell-cell interactions. Bounded asynchrony is the result of a scheduler that bounds ...
Jasmin Fisher, Thomas A. Henzinger, Maria Mateescu...
QEST
2006
IEEE
15 years 11 months ago
Causality, Responsibility, and Blame: A Structural-Model Approach
This talk will provide an overview of work that I have done with Hana Chockler, Orna Kupferman, and Judea Pearl [1, 2, 10, 9] on defining notions such as causality, explanation, ...
Joseph Y. Halpern
ICFP
2004
ACM
16 years 5 months ago
A sound (and complete) model of contracts
Even in statically typed languages it is useful to have certain invariants checked dynamically. Findler and Felleisen gave an algorithm for dynamically checking expressive higher-...
Matthias Blume, David A. McAllester