Sciweavers

2875 search results - page 145 / 575
» Model checking agentspeak
Sort
View
105
Voted
ISW
2004
Springer
15 years 6 months ago
Model-Checking Access Control Policies
We present a model of access control which provides fine-grained data-dependent control, can express permissions about permissions, can express delegation, and can describe syste...
Dimitar P. Guelev, Mark Ryan, Pierre-Yves Schobben...
FIW
2007
133views Communications» more  FIW 2007»
15 years 2 months ago
Conflict Detection in Call Control Using First-Order Logic Model Checking
Feature interaction detection methods, whether online or offline, depend on previous knowledge of conflicts between the actions executed by the features. This knowledge is usually ...
Ahmed F. Layouni, Luigi Logrippo, Kenneth J. Turne...
DAC
2008
ACM
16 years 1 months ago
Construction of concrete verification models from C++
C++ based verification methodologies are now emerging as the preferred method for SOC design. However most of the verification involving the C++ models are simulation based. The c...
Malay Haldar, Gagandeep Singh, Saurabh Prabhakar, ...
129
Voted
ATVA
2005
Springer
202views Hardware» more  ATVA 2005»
15 years 6 months ago
Model Checking Real Time Java Using Java PathFinder
Abstract. The Real Time Specification for Java (RTSJ) is an augmentation of Java for real time applications of various degrees of hardness. The central features of RTSJ are real t...
Gary Lindstrom, Peter C. Mehlitz, Willem Visser
72
Voted
DAC
1999
ACM
16 years 1 months ago
Symbolic Model Checking Using SAT Procedures instead of BDDs
Armin Biere, Alessandro Cimatti, Edmund M. Clarke,...