Sciweavers

1033 search results - page 85 / 207
» Properties of Exercise Strategies
Sort
View
69
Voted
CAV
2009
Springer
206views Hardware» more  CAV 2009»
15 years 10 months ago
D-Finder: A Tool for Compositional Deadlock Detection and Verification
D-Finder tool implements a compositional method for the verification of component-based systems described in BIP language encompassing multi-party interaction. For deadlock detecti...
Saddek Bensalem, Marius Bozga, Thanh-Hung Nguyen, ...
DAC
2002
ACM
15 years 11 months ago
Model composition for scheduling analysis in platform design
We present a compositional approach to analyze timing behavior of complex platforms with different scheduling strategies. The approach uses event interfacing in order to couple pr...
Kai Richter, Dirk Ziegenbein, Marek Jersak, Rolf E...
IEEEIAS
2007
IEEE
15 years 4 months ago
Modeling Security Protocols as Games
We model security protocols as a game tree using concepts of game semantics. The model interprets protocol specifications as strategies over a game tree that represents the type ...
Mohamed Saleh, Mourad Debbabi
ECAL
2007
Springer
15 years 4 months ago
Evolution of Acoustic Communication Between Two Cooperating Robots
In this paper we describe a model in which artificial evolution is employed to design neural mechanisms that control the motion of two autonomous robots required to communicate th...
Elio Tuci, Christos Ampatzis
IWDW
2007
Springer
15 years 4 months ago
Dither Modulation in the Logarithmic Domain
Abstract. Scaling attacks are well-known to be some of the most harmful strategies against quantization-based watermarking methods, as they desynchronize the decoder, completely ru...
Pedro Comesaña, Fernando Pérez-Gonz&...