Sciweavers

4962 search results - page 454 / 993
» Stochastic Model Checking
Sort
View
WSC
1997
15 years 5 months ago
Seven Habits of Highly Successful Input Modelers
Discrete-event simulation models typically have stochastic components that mimic the probabilistic nature of the system under consideration. Successful input modeling requires a c...
Lawrence Leemis
118
Voted
ACSAC
2002
IEEE
15 years 9 months ago
Representing TCP/IP Connectivity For Topological Analysis of Network Security
The individual vulnerabilities of hosts on a network can be combined by an attacker to gain access that would not be possible if the hosts were not interconnected. Currently avail...
Ronald W. Ritchey, Brian O'Berry, Steven Noel
CONCUR
2007
Springer
15 years 8 months ago
Temporal Antecedent Failure: Refining Vacuity
We re-examine vacuity in temporal logic model checking. We note two disturbing phenomena in recent results in this area. The first indicates that not all vacuities detected in prac...
Shoham Ben-David, Dana Fisman, Sitvanit Ruah
FORTE
2003
15 years 5 months ago
A Lightweight Formal Analysis of a Multicast Key Management Scheme
Abstract. This paper describes the analysis of Pull-Based Asynchronous Rekeying Framework (ARF), a recently proposed solution to the scalable group key management problem in secure...
Mana Taghdiri, Daniel Jackson
ZEUS
2010
180views Communications» more  ZEUS 2010»
15 years 5 months ago
An efficient approach to detect lack of synchronization in acyclic workflow graphs
Control-flow analysis of business process models requires to check the absence of lack of synchronization. We use workflow graphs, which may contain inclusive OR gateways, to repre...
Cédric Favre