Sciweavers

798 search results - page 71 / 160
» Proving More Properties with Bounded Model Checking
Sort
View
ICALP
2001
Springer
15 years 8 months ago
Symbolic Trace Analysis of Cryptographic Protocols
A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
Michele Boreale
QEST
2010
IEEE
15 years 2 months ago
Reasoning about MDPs as Transformers of Probability Distributions
We consider Markov Decision Processes (MDPs) as transformers on probability distributions, where with respect to a scheduler that resolves nondeterminism, the MDP can be seen as ex...
Vijay Anand Korthikanti, Mahesh Viswanathan, Gul A...
ICSE
2009
IEEE-ACM
16 years 5 months ago
Analyzing critical process models through behavior model synthesis
Process models capture tasks performed by agents together with their control flow. Building and analyzing such models is important but difficult in certain areas such as safety-cr...
Christophe Damas, Bernard Lambeau, Francois Roucou...
FORMATS
2005
Springer
15 years 9 months ago
Implementation of Timed Automata: An Issue of Semantics or Modeling?
Abstract. We examine to what extent implementation of timed automata can be achieved using the standard semantics and appropriate modeling, instead of introducing new semantics. We...
Karine Altisen, Stavros Tripakis
AMC
2007
64views more  AMC 2007»
15 years 4 months ago
On the global attractivity controversy for a delay model of hematopoiesis
Recently, particular counterexamples were constructed to some theorems of a previous paper, concerning the global attractivity of the positive equilibrium for the delay equation _...
Gergely Röst