Sciweavers

759 search results - page 56 / 152
» On formal models for social verification
Sort
View
COMCOM
2000
97views more  COMCOM 2000»
14 years 9 months ago
Verification of security protocols using LOTOS-method and application
We explain how the formal language LOTOS can be used to specify security protocols and cryptographic operations. We describe how security properties can be modelled as safety prop...
Guy Leduc, François Germeau
CBSE
2006
Springer
15 years 1 months ago
Verification of Component-Based Software Application Families
We present a novel approach which facilitates formal verification of component-based software application families using model checking. This approach enables effective composition...
Fei Xie, James C. Browne
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
15 years 4 months ago
Courier Assignment in Social Networks
Integration is important in politics, business, and technology. In all these fields, the definition of integration is vague. We build a formal measure of integration based on the ...
Jeffrey V. Nickerson, Stephan Olariu
FM
2003
Springer
129views Formal Methods» more  FM 2003»
15 years 3 months ago
Trends in Software Verification
With the steady increase in computational power of general purpose computers, our ability to analyze routine software artifacts is also steadily increasing. As a result, we are wit...
Gerard J. Holzmann
FORTE
2004
14 years 11 months ago
Automatized Verification of Ad Hoc Routing Protocols
Numerous specialized ad hoc routing protocols are currently proposed for use, or being implemented. Few of them have been subjected to formal verification. This paper evaluates two...
Oskar Wibling, Joachim Parrow, Arnold Neville Pear...