Sciweavers

5015 search results - page 50 / 1003
» Model Checking a Path
Sort
View
109
Voted
SOFSEM
2007
Springer
15 years 6 months ago
Games, Time, and Probability: Graph Models for System Design and Analysis
Digital technology is increasingly deployed in safety-critical situations. This calls for systematic design and verification methodologies that can cope with three major sources o...
Thomas A. Henzinger
95
Voted
EDBT
2006
ACM
177views Database» more  EDBT 2006»
16 years 26 days ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...
AMOST
2007
ACM
15 years 4 months ago
Achieving both model and code coverage with automated gray-box testing
We have devised a novel technique to automatically generate test cases for a software system, combining black-box model-based testing with white-box parameterized unit testing. Th...
Nicolas Kicillof, Wolfgang Grieskamp, Nikolai Till...
109
Voted
GLOBECOM
2007
IEEE
15 years 7 months ago
Two-Hop Two-Path Voice Communications Over a Mobile Ad-Hoc Network
Abstract— We consider two-hop communication of a delaysensitive, memoryless Gaussian source over two independent paths in an ad-hoc network. To capture the behavior an ad-hoc net...
Jagadeesh Balam, Jerry D. Gibson
CONCUR
2001
Springer
15 years 5 months ago
Bounded Reachability Checking with Process Semantics
Bounded model checking has been recently introduced as an efficient verification method for reactive systems. In this work we apply bounded model checking to asynchronous systems....
Keijo Heljanko