Sciweavers

2875 search results - page 355 / 575
» Model checking agentspeak
Sort
View
FDL
2005
IEEE
15 years 9 months ago
Meta Modelling of Embedded Systems using Active Databases
The development process of embedded systems is characterized by the cooperation of various domains: components of hardware and software have to be considered as well as components...
Dieter Monjau, Mathias Sporer
ADC
2004
Springer
109views Database» more  ADC 2004»
15 years 8 months ago
Data Flow and Validation in Workflow Modelling
A complete workflow specification requires careful integration of many different process characteristics. Decisions must be made as to the definitions of individual activities, th...
Shazia W. Sadiq, Maria E. Orlowska, Wasim Sadiq, C...
SACMAT
2010
ACM
15 years 8 months ago
A model of triangulating environments for policy authoring
Policy authors typically reconcile several different mental models and goals, such as enabling collaboration, securing information, and conveying trust in colleagues. The data un...
Kathi Fisler, Shriram Krishnamurthi
CSFW
1998
IEEE
15 years 7 months ago
Proving Security Protocols with Model Checkers by Data Independence Techniques
Model checkers such as FDR have been extremely e ective in checking for, and nding, attacks on cryptographic protocols { see, for example 11, 12, 14] and many of the papers in 3]....
A. W. Roscoe
121
Voted
DATE
2004
IEEE
184views Hardware» more  DATE 2004»
15 years 7 months ago
Automatic Verification of Safety and Liveness for XScale-Like Processor Models Using WEB Refinements
We show how to automatically verify that complex XScale-like pipelined machine models satisfy the same safety and liveness properties as their corresponding instruction set archit...
Panagiotis Manolios, Sudarshan K. Srinivasan