Sciweavers

422 search results - page 54 / 85
» Model Checking TLA Specifications
Sort
View
51
Voted
ISI
2006
Springer
14 years 9 months ago
Computational Modeling and Experimental Validation of Aviation Security Procedures
Security of civil aviation has become a major concern in recent years, leading to a variety of protective measures related to airport and aircraft security to be established by re...
Uwe Glässer, Sarah Rastkar, Mona Vajihollahi
DAC
2000
ACM
15 years 10 months ago
Hardware implementation of communication protocols modeled by concurrent EFSMs with multi-way synchronization
In this paper, we propose a technique to implement communication protocols as hardware circuits using a model of concurrent EFSMs with multi-way synchronization. Since use of mult...
Hisaaki Katagiri, Keiichi Yasumoto, Akira Kitajima...
ICECCS
2007
IEEE
154views Hardware» more  ICECCS 2007»
15 years 4 months ago
A light-weight static approach to analyzing UML behavioral properties
Identifying and resolving design problems in the early design phase can help ensure software quality and save costs. There are currently few tools for analyzing designs expressed ...
Lijun Yu, Robert B. France, Indrakshi Ray, Kevin L...
APSEC
2007
IEEE
15 years 1 months ago
Definition of an Executable SPEM 2.0
One major advantage of executable models is that once constructed, they can be run, checked, validated and improved in short incremental and iterative cycles. In the field of Soft...
Reda Bendraou, Benoît Combemale, Xavier Cr&e...
SIGSOFT
2007
ACM
15 years 10 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna