Sciweavers

2875 search results - page 435 / 575
» Model checking agentspeak
Sort
View
103
Voted
CAV
2003
Springer
145views Hardware» more  CAV 2003»
15 years 6 months ago
Monitoring Temporal Rules Combined with Time Series
Run-time monitoring of temporal properties and assertions is used for testing and as a component of execution-based model checking techniques. Traditional run-time monitoring howev...
Doron Drusinsky
92
Voted
CAV
2003
Springer
156views Hardware» more  CAV 2003»
15 years 6 months ago
Abstraction and BDDs Complement SAT-Based BMC in DiVer
ion and BDDs Complement SAT-based BMC in DiVer Aarti Gupta1, Malay Ganai1 , Chao Wang2, Zijiang Yang1, Pranav Ashar1 1 NEC Laboratories America, Princeton, NJ, U.S.A. 2 University ...
Aarti Gupta, Malay K. Ganai, Chao Wang, Zijiang Ya...
117
Voted
CC
2003
Springer
102views System Software» more  CC 2003»
15 years 6 months ago
Precision in Practice: A Type-Preserving Java Compiler
Popular mobile code architectures (Java and .NET) include verifiers to check for memory safety and other security properties. Since their formats are relatively high level, suppor...
Christopher League, Zhong Shao, Valery Trifonov
CHARME
2003
Springer
129views Hardware» more  CHARME 2003»
15 years 6 months ago
On the Correctness of an Intrusion-Tolerant Group Communication Protocol
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
Mohamed Layouni, Jozef Hooman, Sofiène Taha...
93
Voted
HICSS
2002
IEEE
109views Biometrics» more  HICSS 2002»
15 years 5 months ago
Monitoring Software Requirements Using Instrumented Code
Ideally, software is derived from requirements whose properties have been established as good. However, it is difficult to define and analyze requirements. Moreover, derivation of...
William N. Robinson