Sciweavers

1036 search results - page 51 / 208
» Verification Programs for Abduction
Sort
View
98
Voted
WWW
2005
ACM
16 years 1 months ago
Design for verification for asynchronously communicating Web services
We present a design for verification approach to developing reliable web services. We focus on composite web services which consist of asynchronously communicating peers. Our goal...
Aysu Betin-Can, Tevfik Bultan, Xiang Fu
96
Voted
ATAL
2010
Springer
15 years 1 months ago
Reasoning about strategies of multi-agent programs
Verification of multi-agent programs is a key problem in agent research and development. This paper focuses on multi-agent programs that consist of a finite set of BDI-based agent...
Mehdi Dastani, Wojciech Jamroga
143
Voted
CADE
2008
Springer
16 years 1 months ago
Exploring Model-Based Development for the Verification of Real-Time Java Code
Many safety- and security-critical systems are real-time systems and, as a result, tools and techniques for verifying real-time systems are extremely important. Simulation and test...
Niusha Hakimipour, Paul A. Strooper, Roger Duke
ICECCS
2000
IEEE
87views Hardware» more  ICECCS 2000»
15 years 5 months ago
Automated Result Verification with AWK
The goal of result-verificationis toprove that one execution run of a program satisjes its speciJcation. Compared with iniplenzentation-verification,result-verification has a larg...
Balkhis Abu Bakar, Tomasz Janowski
86
Voted
IFIP
2009
Springer
14 years 10 months ago
A User Interface for a Game-Based Protocol Verification Tool
We present a platform that allows a protocol researcher to specify the sequence of games from an initial protocol to a protocol where the security property under consideration can ...
Peeter Laud, Ilja Tsahhirov