Sciweavers

2702 search results - page 105 / 541
» Practically Applicable Formal Methods
Sort
View
JCS
2010
80views more  JCS 2010»
14 years 4 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
FMCO
2006
Springer
107views Formal Methods» more  FMCO 2006»
15 years 1 months ago
Learning Meets Verification
In this paper, we give an overview on some algorithms for learning automata. Starting with Biermann's and Angluin's algorithms, we describe some of the extensions caterin...
Martin Leucker
ATAL
2005
Springer
15 years 3 months ago
Generating intentions through argumentation
In this paper we consider how a BDI agent might determine its best course of action. We draw on previous work which has presented a model of persuasion over action and we discuss ...
Katie Atkinson, Trevor J. M. Bench-Capon, Peter Mc...
FM
2008
Springer
171views Formal Methods» more  FM 2008»
14 years 11 months ago
Assume-Guarantee Verification for Interface Automata
Interface automata provide a formalism capturing the high level interactions between software components. Checking compatibility, and other safety properties, in an automata-based ...
Michael Emmi, Dimitra Giannakopoulou, Corina S. Pa...
ICC
2000
IEEE
109views Communications» more  ICC 2000»
15 years 2 months ago
OFDM with Trailing Zeros versus OFDM with Cyclic Prefix: Links, Comparisons, and Application to the HiperLAN/2 System
This paper proposes a simple equalizer for a recent multicarrier block transmission scheme which pads zeros (as opposed to a cyclic prefix) in each transmitted block. In the abse...
Bertrand Muquet, Marc de Courville, Pierre Duhamel...