Sciweavers

1078 search results - page 96 / 216
» Modelling and Verifying of e-Commerce Systems
Sort
View
CSFW
2002
IEEE
15 years 9 months ago
Probabilistic Analysis of Anonymity
We present a formal analysis technique for probabilistic security properties of peer-to-peer communication systems based on random message routing among members. The behavior of g...
Vitaly Shmatikov
COMSIS
2006
129views more  COMSIS 2006»
15 years 4 months ago
Constraint-Based Knowledge Representation for Individualized Instruction
Traditional knowledge representations were developed to encode complete, explicit and executable programs, a goal that makes them less than ideal for representing the incomplete an...
Stellan Ohlsson, Antonija Mitrovic
DATE
2005
IEEE
144views Hardware» more  DATE 2005»
15 years 10 months ago
Context Sensitive Performance Analysis of Automotive Applications
Accurate timing analysis is key to efficient embedded system synthesis and integration. While industrial control software systems are developed using graphical models, such as Ma...
Jan Staschulat, Rolf Ernst, Andreas Schulze, Fabia...
DAC
1996
ACM
15 years 8 months ago
Integrating Formal Verification Methods with A Conventional Project Design Flow
We present a formal verification methodology that we have used on a computer system design project. The methodology integrates a temporal logic model checker with a conventional pr...
Ásgeir Th. Eiríksson
SPIN
2000
Springer
15 years 7 months ago
Logic Verification of ANSI-C Code with SPIN
We describe a tool, called AX, that can be used in combination with the model checker SPIN to efficiently verify logical properties of distributed software systems implemented in A...
Gerard J. Holzmann