Sciweavers

5216 search results - page 332 / 1044
» Planning as Model Checking
Sort
View
IWFM
2000
107views Formal Methods» more  IWFM 2000»
15 years 6 months ago
A Comparison of Three Model Checkers Applied to a Distributed Database Problem
ct Increasingly, model checking is being applied to more abstract problem domains than the traditional protocol analysis. The extent to which such an approach is able to provide us...
A. J. Currie
KBSE
2008
IEEE
15 years 11 months ago
Unit Testing of Flash Memory Device Driver through a SAT-Based Model Checker
Flash memory has become virtually indispensable in most mobile devices. In order for mobile devices to successfully provide services to users, it is essential that flash memory b...
Moonzoo Kim, Yunho Kim, Hotae Kim
246
Voted
SP
2006
IEEE
177views Security Privacy» more  SP 2006»
15 years 11 months ago
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis
Security concerns are becoming increasingly critical in networked systems. Firewalls provide important defense for network security. However, misconfigurations in firewalls are ...
Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, C...
191
Voted
GG
2008
Springer
15 years 6 months ago
Behavior Preservation in Model Refactoring Using DPO Transformations with Borrowed Contexts
Behavior preservation, namely the fact that the behavior of a model is not altered by the transformations, is a crucial property in refactoring. The most common approaches to behav...
Guilherme Rangel, Leen Lambers, Barbara König...
IROS
2006
IEEE
121views Robotics» more  IROS 2006»
15 years 11 months ago
Planning and Acting in Uncertain Environments using Probabilistic Inference
— An important problem in robotics is planning and selecting actions for goal-directed behavior in noisy uncertain environments. The problem is typically addressed within the fra...
Deepak Verma, Rajesh P. N. Rao