Sciweavers

372 search results - page 16 / 75
» Transaction Based Modeling and Verification of Hardware Prot...
Sort
View
CAV
2007
Springer
111views Hardware» more  CAV 2007»
15 years 1 months ago
Verification Across Intellectual Property Boundaries
In many industries, the share of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) righ...
Sagar Chaki, Christian Schallhart, Helmut Veith
87
Voted
ENTCS
2008
113views more  ENTCS 2008»
14 years 9 months ago
A Model-Based Approach to the Verification and Adaptation of WF/.NET Components
This paper presents an approach which supports verification and model-based adaptation of software compod services implemented using Windows Workflow Foundation (WF). First, we pr...
Javier Cubo, Gwen Salaün, Carlos Canal, Ernes...
ASWEC
2006
IEEE
15 years 3 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...
FMCO
2009
Springer
134views Formal Methods» more  FMCO 2009»
14 years 7 months ago
Verification of Context-Dependent Channel-Based Service Models
Abstract. The paradigms of service-oriented computing and modeldriven development are becoming of increasing importance in the field of software engineering. According to these par...
Natallia Kokash, Christian Krause, Erik P. de Vink
GLVLSI
2007
IEEE
151views VLSI» more  GLVLSI 2007»
15 years 1 months ago
Hand-in-hand verification of high-level synthesis
This paper describes a formal verification methodology of highnthesis (HLS) process. The abstraction level of the input to HLS is so high compared to that of the output that the v...
Chandan Karfa, Dipankar Sarkar, Chittaranjan A. Ma...