Sciweavers

1078 search results - page 125 / 216
» Modelling and Verifying of e-Commerce Systems
Sort
View
CSFW
2005
IEEE
15 years 10 months ago
Game-Based Analysis of Denial-of-Service Prevention Protocols
Availability is a critical issue in modern distributed systems. While many techniques and protocols for preventing denial of service (DoS) attacks have been proposed and deployed ...
Ajay Mahimkar, Vitaly Shmatikov
ASYNC
2007
IEEE
129views Hardware» more  ASYNC 2007»
15 years 8 months ago
Formal Verification of CHP Specifications with CADP Illustration on an Asynchronous Network-on-Chip
Few formal verification techniques are currently available for asynchronous designs. In this paper, we describe a new approach for the formal verification of asynchronous architec...
Gwen Salaün, Wendelin Serwe, Yvain Thonnart, ...
SAS
2009
Springer
119views Formal Methods» more  SAS 2009»
16 years 5 months ago
Abstraction Refinement for Quantified Array Assertions
ion Refinement for Quantified Array Assertions Mohamed Nassim Seghir1, , Andreas Podelski1 , and Thomas Wies1,2 1 University of Freiburg, Germany 2 EPFL, Switzerland Abstract. We p...
Mohamed Nassim Seghir, Andreas Podelski, Thomas Wi...
GECCO
2005
Springer
127views Optimization» more  GECCO 2005»
15 years 10 months ago
Sufficiency verification of HIV-1 pathogenesis based on multi-agent simulation
Researchers of HIV-1 are today, still unable to determine exactly the biological mechanisms that cause AIDS. Various mechanisms have been hypothesized and their existences have be...
Zaiyi Guo, Hann Kwang Han, Joc Cing Tay
IFIP8
2007
15 years 5 months ago
A Hybrid Approach for Business Process Verification
Business Process Verification (BPV) is increasingly important in emerging BPM Systems. Although many approaches related to BPV exist, the gap between formal models defined in previ...
Bing Li, Junichi Iijima