Sciweavers

2875 search results - page 502 / 575
» Model checking agentspeak
Sort
View
74
Voted
EDBT
2006
ACM
118views Database» more  EDBT 2006»
16 years 22 days ago
On Honesty in Sovereign Information Sharing
Abstract. We study the following problem in a sovereign informationsharing setting: How to ensure that the individual participants, driven solely by self-interest, will behave hone...
Rakesh Agrawal, Evimaria Terzi
83
Voted
ICSE
2007
IEEE-ACM
16 years 21 days ago
Randomized Differential Testing as a Prelude to Formal Verification
Most flight software testing at the Jet Propulsion Laboratory relies on the use of hand-produced test scenarios and is executed on systems as similar as possible to actual mission...
Alex Groce, Gerard J. Holzmann, Rajeev Joshi
ICSE
2008
IEEE-ACM
16 years 21 days ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
103
Voted
ICSE
2008
IEEE-ACM
16 years 21 days ago
An ontology-driven software architecture evaluation method
Software architecture evaluation has a crucial role in the life cycle of software intensive systems. In this paper we propose an approach to empower a software architecture evalua...
Aida Erfanian, Fereidoun Shams Aliee
VMCAI
2010
Springer
15 years 7 months ago
Regular Linear Temporal Logic with Past
This paper upgrades Regular Linear Temporal Logic (RLTL) with past operators and complementation. RLTL is a temporal logic that extends the expressive power of linear temporal logi...
César Sánchez, Martin Leucker