Sciweavers

1463 search results - page 125 / 293
» Model Checking Implicit-Invocation Systems
Sort
View
119
Voted
AICCSA
2006
IEEE
117views Hardware» more  AICCSA 2006»
15 years 5 months ago
Adaptive Search in a Semi-Structured Peer-to-Peer System
s: Software Foundations Modeling Redundancy: Quantitative and Qualitative Models .......................................................43 Ali Mili............New Jersey Institute ...
Christof Squarr, Jens Bruhn, Guido Wirtz
ADAEUROPE
2008
Springer
15 years 3 months ago
On the Timed Automata-Based Verification of Ravenscar Systems
The Ravenscar profile for Ada enforces several restrictions on the usage of general-purpose tasking constructs, thereby facilitating most analysis tasks and in particular functiona...
Iulian Ober, Nicolas Halbwachs
MODELS
2007
Springer
15 years 7 months ago
A Metamodel-Based Approach for Analyzing Security-Design Models
Abstract We have previously proposed an expressive UML-based language for constructing and transforming security-design models, which are models that combine design specifications...
David A. Basin, Manuel Clavel, Jürgen Doser, ...
ECSA
2010
Springer
15 years 1 months ago
Linking Design Decisions to Design Models in Model-Based Software Development
Abstract. Numerous design decisions are made in model-based software development which often are not documented explicitly. Hence, the design knowledge is 'in the designers mi...
Patrick Könemann, Olaf Zimmermann
ICCD
1995
IEEE
109views Hardware» more  ICCD 1995»
15 years 5 months ago
Verifying the performance of the PCI local bus using symbolic techniques
Symbolic model checking is a successful technique for checking properties of large finite-state systems. This method has been used to verify a number of real-world hardware desig...
Sérgio Vale Aguiar Campos, Edmund M. Clarke...