Sciweavers

1078 search results - page 116 / 216
» Modelling and Verifying of e-Commerce Systems
Sort
View
KBSE
2009
IEEE
15 years 11 months ago
SMT-Based Bounded Model Checking for Embedded ANSI-C Software
Propositional bounded model checking has been applied successfully to verify embedded software but is limited by the increasing propositional formula size and the loss of structur...
Lucas Cordeiro, Bernd Fischer, João Marques...
TACAS
1998
Springer
98views Algorithms» more  TACAS 1998»
15 years 8 months ago
Efficient Modeling of Memory Arrays in Symbolic Ternary Simulation
This paper enables symbolic ternary simulation of systems with large embedded memories. Each memory array is replaced with a behavioral model, where the number of symbolic variable...
Miroslav N. Velev, Randal E. Bryant
ASE
2011
14 years 11 months ago
Compositional model checking of software product lines using variation point obligations
This paper introduces a technique for incremental and compositional model checking that allows efficient reuse of model-checking results associated with the features in a product l...
Jing Liu, Samik Basu, Robyn R. Lutz
CCS
2008
ACM
15 years 6 months ago
Stale-safe security properties for group-based secure information sharing
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William...
ICCD
2001
IEEE
124views Hardware» more  ICCD 2001»
16 years 1 months ago
High-Level Power Modeling of CPLDs and FPGAs
In this paper, we present a high-level power modeling technique to estimate the power consumption of reconfigurable devices such as complex programmable logic devices (CPLDs) and ...
Li Shang, Niraj K. Jha