Sciweavers

2513 search results - page 126 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
ICFEM
2009
Springer
14 years 7 months ago
An Efficient Translation of Timed-Arc Petri Nets to Networks of Timed Automata
Bounded timed-arc Petri nets with read-arcs were recently proven equivalent to networks of timed automata, though the Petri net model cannot express urgent behaviour and the descri...
Joakim Byg, Kenneth Yrke Jørgensen, Jir&iac...
INFORMATICALT
2002
72views more  INFORMATICALT 2002»
14 years 9 months ago
Simulation of Conflict in an Agent World: Access to Resources and Possibility of Termination of the Population
The goal of the paper is to create a model for investigating the character of relationships between the freedom and restrictions in the terrorism context, in order to find out how ...
Jaak Tepandi
SPIN
2005
Springer
15 years 3 months ago
Symbolic Model Checking for Asynchronous Boolean Programs
Abstract. Software model checking problems generally contain two different types of non-determinism: 1) non-deterministically chosen values; 2) the choice of interleaving among th...
Byron Cook, Daniel Kroening, Natasha Sharygina
WEBENG
2001
Springer
15 years 2 months ago
Development and Evolution of Web-Applications Using the WebComposition Process Model
From a software engineering perspective the World Wide Web is a new application platform. The implementation model that the Web is based on makes it difficult to apply classic proc...
Martin Gaedke, Guntram Gräf
ISSRE
2008
IEEE
15 years 4 months ago
Using Fault Modeling in Safety Cases
For many safety-critical systems a safety case is built as part of the certification or acceptance process. The safety case assembles evidence to justify that the design and imple...
Robyn R. Lutz, Ann Patterson-Hine