Sciweavers

5525 search results - page 230 / 1105
» Verification of Model Transformations
Sort
View
EUROCAST
2007
Springer
161views Hardware» more  EUROCAST 2007»
15 years 8 months ago
Using Verification Technology to Specify and Detect Malware
Abstract. Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checki...
Andreas Holzer, Johannes Kinder, Helmut Veith
APLAS
2004
ACM
15 years 8 months ago
History Effects and Verification
This paper shows how type effect systems can be combined with model-checking techniques to produce powerful, automatically verifiable program logics for higher-order programs. The ...
Christian Skalka, Scott F. Smith
BIRTHDAY
2006
Springer
15 years 8 months ago
Realistic Worst-Case Execution Time Analysis in the Context of Pervasive System Verification
We describe a gate level design of a FlexRay-like bus interface. An electronic control unit (ECU) is obtained by integrating this interface into the design of the verified VAMP pro...
Steffen Knapp, Wolfgang J. Paul
CSFW
2010
IEEE
15 years 7 months ago
Formal Verification of Privacy for RFID Systems
RFID tags are being widely employed in a variety of applications, ranging from barcode replacement to electronic passports. Their extensive use, however, in combination with their ...
Mayla Brusò, Konstantinos Chatzikokolakis, ...
MASCOTS
2004
15 years 5 months ago
Performance Characterisation and Verification of JavaSpaces Based on Design of Experiments
In the ever increasing world of distributed systems, different middleware implementations can be compared qualitatively or quantitatively. Existing evaluation techniques are often...
Frederic Hancke, Tom Dhaene, Jan Broeckhove