Sciweavers

1078 search results - page 28 / 216
» Modelling and Verifying of e-Commerce Systems
Sort
View
RTCSA
2008
IEEE
15 years 6 months ago
Verification of COMDES-II Systems Using UPPAAL with Model Transformation
COMDES-II is a component-based software framework intended for Model Integrated Computing (MIC) of embedded control systems with hard real-time constraints. We present a transforma...
Xu Ke, Paul Pettersson, Krzysztof Sierszecki, Chri...
IPPS
2002
IEEE
15 years 4 months ago
An Approach to Compositional Model Checking
A natural trend in most of the engineering disciplines is the construction of systems from components. This has the potential to reduce costs and increase reliability, provided th...
Hector A. Andrade, Beverly Sanders
DATE
2004
IEEE
129views Hardware» more  DATE 2004»
15 years 3 months ago
On the Design and Verification Methodology of the Look-Aside Interface
In this paper, we present a technique to design and verify the Look-Aside (LA-1) Interface standard used in network processors. Our design flow includes several refinements starti...
Ali Habibi, Asif Iqbal Ahmed, Otmane Aït Moha...
ATAL
2003
Springer
15 years 5 months ago
Towards model checking interpreted systems
We show how it is possible to pair the NuSMV model checker with Akka, a software platform used to check validity of propositional modal formulas, to verify properties of multi-age...
Alessio Lomuscio, Franco Raimondi, Marek J. Sergot
CSFW
2012
IEEE
13 years 2 months ago
Gran: Model Checking Grsecurity RBAC Policies
—Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, ver...
Michele Bugliesi, Stefano Calzavara, Riccardo Foca...