Sciweavers

372 search results - page 30 / 75
» Model Checking Commitment Protocols
Sort
View
ACSC
2007
IEEE
15 years 4 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
102
Voted
ICNS
2006
IEEE
15 years 6 months ago
MojaveComm: A Robust Group Communication Library for Grid Environments
This paper introduces a fault-tolerant group communication protocol that is aimed at grid and wide area environments. The protocol has two layers. The lower layer provides a total...
Cristian Tapus, David A. Noblet, Jason Hickey
107
Voted
ENTCS
2006
136views more  ENTCS 2006»
15 years 15 days ago
Automated Game Analysis via Probabilistic Model Checking: a case study
It has been recognised for some time that there are close links between the various logics developed for the analysis of multi-agent systems and the many game-theoretic models dev...
Paolo Ballarini, Michael Fisher, Michael Wooldridg...
SIGMETRICS
2008
ACM
130views Hardware» more  SIGMETRICS 2008»
15 years 12 days ago
Using probabilistic model checking in systems biology
Probabilistic model checking is a formal verification framework for systems which exhibit stochastic behaviour. It has been successfully applied to a wide range of domains, includ...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
RTSS
1997
IEEE
15 years 4 months ago
On-the-fly symbolic model checking for real-time systems
This paper presents an on-the-fly and symbolic algorithm for checking whether a timed automaton satisfies a formula of a timed temporal logic which is more expressive than TCTL....
Ahmed Bouajjani, Stavros Tripakis, Sergio Yovine