Sciweavers

571 search results - page 48 / 115
» Performing causality analysis by bounded model checking
Sort
View
ESORICS
2002
Springer
15 years 11 months ago
Formal Security Analysis with Interacting State Machines
We introduce the ISM approach, a framework for modeling and verifying reactive systems in a formal, even machine-checked, way. The framework has been developed for applications in ...
David von Oheimb, Volkmar Lotz
LCN
2008
IEEE
15 years 6 months ago
An analysis on error servers for stochastic network calculus
—Network calculus is a recently developed theory dealing with queuing systems found in computer networks with focus on service guarantee analysis. In the current network calculus...
Jing Xie, Yuming Jiang
ICCAD
2003
IEEE
119views Hardware» more  ICCAD 2003»
15 years 8 months ago
Analytical Bound for Unwanted Clock Skew due to Wire Width Variation
Under modern VLSI technology, process variations greatly affect circuit performance, especially clock skew which is very timing sensitive. Unwanted skew due to process variation f...
Anand Rajaram, Bing Lu, Wei Guo, Rabi N. Mahapatra...
ICFEM
2009
Springer
15 years 6 months ago
Modeling and Analysis of Thread-Pools in an Industrial Communication Platform
Thread pools are often used as a pattern to increase the throughput and responsiveness of software systems. Implementations of thread pools may differ considerably from each other...
Frank S. de Boer, Immo Grabe, Mohammad Mahdi Jagho...
CJ
2004
141views more  CJ 2004»
14 years 11 months ago
Modeling and Analysis of a Scheduled Maintenance System: a DSPN Approach
This paper describes a way to manage the modeling and analysis of Scheduled Maintenance Systems (SMS) within an analytically tractable context. We chose a significant case study h...
Andrea Bondavalli, Roberto Filippini