Sciweavers

981 search results - page 134 / 197
» Semantics-aware trace analysis
Sort
View
CCS
2001
ACM
15 years 7 months ago
Events in security protocols
The events of a security protocol and their causal dependency can play an important role in the analysis of security properties. This insight underlies both strand spaces and the ...
Federico Crazzolara, Glynn Winskel
HYBRID
2009
Springer
15 years 7 months ago
Trajectory Based Verification Using Local Finite-Time Invariance
Abstract. In this paper we propose a trajectory based reachability analysis by using local finite-time invariance property. Trajectory based analysis are based on the execution tra...
A. Agung Julius, George J. Pappas
CONEXT
2008
ACM
15 years 4 months ago
Is there life in Second Life?
Abstract: Social virtual worlds such as Second Life are digital representations of the real world where human-controlled avatars evolve and interact through social activities. Unde...
Matteo Varvello, Fabio Picconi, Christophe Diot, E...
FORTE
2007
15 years 4 months ago
The DHCP Failover Protocol: A Formal Perspective
Abstract. We present a formal specification and analysis of a faulttolerant DHCP algorithm, used to automatically configure certain host parameters in an IP network. Our algorith...
Rui Fan, Ralph E. Droms, Nancy D. Griffeth, Nancy ...
SERP
2004
15 years 4 months ago
Locating Features in Distributed Systems
In distributed systems, just as in conventional software, it is often necessary to locate the software components that implement a particular user feature. Several dynamic analysi...
Sharon Simmons, Dennis Edwards, Norman Wilde