Sciweavers

1490 search results - page 186 / 298
» The Logic of Authentication Protocols
Sort
View
SEW
2006
IEEE
15 years 6 months ago
Model Checking of Software Components: Combining Java PathFinder and Behavior Protocol Model Checker
Although there exist several software model checkers that check the code against properties specified e.g. via a temporal logic and assertions, or just verifying low-level propert...
Pavel Parizek, Frantisek Plasil, Jan Kofron
DSRT
2008
IEEE
15 years 2 months ago
Lightweight Time Warp - A Novel Protocol for Parallel Optimistic Simulation of Large-Scale DEVS and Cell-DEVS Models
This paper proposes a novel Lightweight Time Warp (LTW) protocol for high-performance parallel optimistic simulation of large-scale DEVS and CellDEVS models. By exploiting the cha...
Qi Liu, Gabriel A. Wainer
JOT
2010
144views more  JOT 2010»
14 years 11 months ago
A Tool for Specifying and Validating Agents' Interaction Protocols: From Agent UML to Maude
To achieve the multi-agent systems’ goals, agents interact to exchange information, to cooperate and to coordinate their tasks. Interaction is generally recognized as an importa...
Farid Mokhati, Brahim Sahraoui, Soufiane Bouzaher,...
ICSE
2008
IEEE-ACM
16 years 19 days ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
SAC
2009
ACM
15 years 7 months ago
Network protocol interoperability testing based on contextual signatures and passive testing
This paper presents a methodology for interoperability testing based on contextual signatures and passive testing with invariants. The concept of contextual signature offers a fra...
Fatiha Zaïdi, Emmanuel Bayse, Ana R. Cavalli