Sciweavers

2500 search results - page 86 / 500
» Specifying Behavior in C
Sort
View
LPAR
2007
Springer
15 years 4 months ago
Operational and Epistemic Approaches to Protocol Analysis: Bridging the Gap
Operational models of (security) protocols, on one hand, are readable and conveniently match their implementation (at a certain abstraction level). Epistemic models, on the other h...
Francien Dechesne, Mohammad Reza Mousavi, Simona O...
MOBICOM
2000
ACM
15 years 2 months ago
W-mail: an electronic mail system for wearable computing environments
This paper describes an e-mail system for wearable computing environments. In this system, we extend the conventional mail format and the server/client(browser) architecture by co...
Hirotaka Ueda, Masahiko Tsukamoto, Shojiro Nishio
FORTE
2008
14 years 11 months ago
Protocol Modeling with Model Program Composition
Designing and interoperability testing of distributed, application-level network protocols is complex. Windows, for example, supports currently more than 200 protocols, ranging fro...
Margus Veanes, Wolfram Schulte
FBT
2000
167views Formal Methods» more  FBT 2000»
14 years 11 months ago
Diagrams for Dataflow
The behavior of reactive systems can be described by their black box properties as a relation between input and output streams. More operational is the behavior's description...
Max Breitling, Jan Philipps
AAAI
1996
14 years 11 months ago
Trajectory Constraints in Qualitative Simulation
We present a method for specifying temporal constraints on trajectories of dynamical systems and enforcing them during qualitative simulation. This capability can be used to focus...
Giorgio Brajnik, Daniel J. Clancy