Sciweavers

2872 search results - page 241 / 575
» On (Omega-)Regular Model Checking
Sort
View
FUIN
2007
99views more  FUIN 2007»
15 years 4 months ago
Verifying Security Protocols Modelled by Networks of Automata
In this paper we show a novel method for modelling behaviours of security protocols using networks of communicating automata in order to verify them with SAT-based bounded model ch...
Miroslaw Kurkowski, Wojciech Penczek
FM
2005
Springer
112views Formal Methods» more  FM 2005»
15 years 10 months ago
Dynamic Component Substitutability Analysis
This paper presents an automated and compositional procedure to solve the substitutability problem in the context of evolving software systems. Our solution contributes two techniq...
Natasha Sharygina, Sagar Chaki, Edmund M. Clarke, ...
TGC
2005
Springer
15 years 9 months ago
Engineering Runtime Requirements-Monitoring Systems Using MDA Technologies
The Model-Driven Architecture (MDA) technology toolset includes a language for describing the structure of meta-data, the MOF, and a language for describing consistency properties ...
James Skene, Wolfgang Emmerich
VLDB
2005
ACM
133views Database» more  VLDB 2005»
15 years 9 months ago
Caching with 'Good Enough' Currency, Consistency, and Completeness
SQL extensions that allow queries to explicitly specify data quality requirements in terms of currency and consistency were proposed in an earlier paper. This paper develops a dat...
Hongfei Guo, Per-Åke Larson, Raghu Ramakrish...
IJISEC
2008
101views more  IJISEC 2008»
15 years 4 months ago
SAT-based model-checking for security protocols analysis
We present a model checking technique for security protocols based on a reduction to propositional logic. At the core of our approach is a procedure that, given a description of th...
Alessandro Armando, Luca Compagna