Sciweavers

4167 search results - page 471 / 834
» Regression model checking
Sort
View
CAV
2009
Springer
150views Hardware» more  CAV 2009»
16 years 5 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
191
Voted
ACOM
2006
Springer
15 years 11 months ago
Temporal Logics for Representing Agent Communication Protocols
Abstract. This paper explores the use of temporal logics in the context of communication protocols for multiagent systems. We concentrate on frameworks where protocols are used to ...
Ulle Endriss
151
Voted
CAISE
2005
Springer
15 years 10 months ago
A Method and Tool for Business-IT Alignment in Enterprise Architecture
Enterprise architects seek to align enterprise processes and structure with their supporting IT systems so that enterprises can flourish in their environment. The enterprise archi...
Alain Wegmann, Pavel Balabko, Lam-Son Lê, Gi...
CHARME
2005
Springer
136views Hardware» more  CHARME 2005»
15 years 10 months ago
Predictive Reachability Using a Sample-Based Approach
Abstract. Unbounded model checking of invariant properties is typically solved using symbolic reachability. However, BDD based reachability methods suffer from lack of robustness ...
Debashis Sahoo, Jawahar Jain, Subramanian K. Iyer,...
EMSOFT
2001
Springer
15 years 9 months ago
An Implementation of Scoped Memory for Real-Time Java
Abstract. This paper presents our experience implementing the memory management extensions in the Real-Time Specification for Java. These extensions are designed to given real-tim...
William S. Beebee, Martin C. Rinard