Sciweavers

759 search results - page 107 / 152
» On formal models for social verification
Sort
View
IPL
2008
110views more  IPL 2008»
14 years 9 months ago
Reduction of stochastic parity to stochastic mean-payoff games
Abstract. A stochastic graph game is played by two players on a game graph with probabilistic transitions. We consider stochastic graph games with -regular winning conditions speci...
Krishnendu Chatterjee, Thomas A. Henzinger
IPL
2006
118views more  IPL 2006»
14 years 9 months ago
Easy intruder deduction problems with homomorphisms
We present complexity results for the verification of security protocols. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebr...
Stéphanie Delaune
HICSS
2008
IEEE
130views Biometrics» more  HICSS 2008»
15 years 4 months ago
Enterprise Modeling for Information System Development within MDA
Object-oriented analysis suggests semiformal usecase driven techniques for problem domain modeling from a computation independent viewpoint. The proposed approach called Topologic...
Janis Osis, Erika Asnina
FMICS
2010
Springer
14 years 11 months ago
Model Checking the FlexRay Physical Layer Protocol
Abstract. The FlexRay standard, developed by a cooperation of leading companies in the automotive industry, is a robust communication protocol for distributed components in modern ...
Michael Gerke 0002, Rüdiger Ehlers, Bernd Fin...
SAC
2006
ACM
14 years 9 months ago
Transformation of yEPC business process models to YAWL
Model transformations are frequently applied in business process modeling to bridge between languages on a different abstraction and formality. In this paper, we define a transfor...
Jan Mendling, Michael Moser, Gustaf Neumann