Sciweavers

1362 search results - page 33 / 273
» Model Checking Large Network Protocol Implementations
Sort
View
105
Voted
FMICS
2010
Springer
15 years 3 months ago
Embedded Network Protocols for Mobile Devices
Embedded networks for chip-to-chip networks are emerging as communication infrastructure in mobile devices. We present three novel embedded network protocols: a sliding window prot...
Despo Galataki, Andrei Radulescu, Kees Verstoep, W...
ATVA
2008
Springer
115views Hardware» more  ATVA 2008»
15 years 3 months ago
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...
Guoqiang Li, Mizuhito Ogawa
115
Voted
ICCCN
1998
IEEE
15 years 6 months ago
HYDRANET : Network Support for Scaling of Large-Scale Services
With the explosive growth of demand for services on the Internet, the networking infrastructure (routers, protocols, servers) is under considerable stress. Mechanisms are needed f...
Hamesh Chawla, Geoff Dillon, Riccardo Bettati
ATAL
2009
Springer
15 years 8 months ago
Abstraction in model checking multi-agent systems
ion in model checking multi-agent systems Mika Cohen Department of Computing Imperial College London London, UK Mads Dam Access Linnaeus Center Royal Institute of Technology Stockh...
Mika Cohen, Mads Dam, Alessio Lomuscio, Francesco ...
CEC
2008
IEEE
15 years 8 months ago
Finding liveness errors with ACO
Abstract— Model Checking is a well-known and fully automatic technique for checking software properties, usually given as temporal logic formulae on the program variables. Most o...
J. Francisco Chicano, Enrique Alba