Sciweavers

4962 search results - page 483 / 993
» Stochastic Model Checking
Sort
View
ACSC
2007
IEEE
15 years 8 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
ENTCS
2006
123views more  ENTCS 2006»
15 years 4 months ago
Steering of Discrete Event Systems: Control Theory Approach
Runtime verification involves monitoring the system at runtime to check for conformance of the execution trace to user defined safety properties. Typically, run-time verifiers do ...
Arvind Easwaran, Sampath Kannan, Oleg Sokolsky
TASE
2008
IEEE
15 years 4 months ago
Perspectives in Probabilistic Verification
Soon after the birth of the flourishing research area of model checking in the early eighties, researchers started to apply this technique to finite automata equipped with probabi...
Joost-Pieter Katoen
JSA
2008
131views more  JSA 2008»
15 years 3 months ago
Formal verification of ASMs using MDGs
We present a framework for the formal verification of abstract state machine (ASM) designs using the multiway decision graphs (MDG) tool. ASM is a state based language for describ...
Amjad Gawanmeh, Sofiène Tahar, Kirsten Wint...
LOGCOM
2010
96views more  LOGCOM 2010»
15 years 2 months ago
The Complexity of the Warranted Formula Problem in Propositional Argumentation
The notion of warrant or justification is one of the central concepts in formal models of argumentation. The dialectical definition of warrant is expressed in terms of recursive...
Robin Hirsch, Nikos Gorogiannis