Sciweavers

5525 search results - page 286 / 1105
» Verification of Model Transformations
Sort
View
EMSOFT
2004
Springer
15 years 8 months ago
Separation of concerns: overhead in modeling and efficient simulation techniques
Separating the description of important aspects of a design such as behavior and architecture, or computation and communication, may yield significant advantages in design time as...
Guang Yang 0004, Alberto L. Sangiovanni-Vincentell...
CORR
2011
Springer
175views Education» more  CORR 2011»
14 years 9 months ago
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol descripti...
Mihhail Aizatulin, Andrew D. Gordon, Jan Jürj...
WSC
2008
15 years 7 months ago
Simulation analysis of cluster tool operations in wafer fabrication
Cluster tools have been one of the proposed alternatives to improve operations performance in semiconductor fabrication. The benefits include high yield throughput, less contamina...
Amit Kumar Gupta, Peter Lendermann, Appa Iyer Siva...
CHARME
2003
Springer
73views Hardware» more  CHARME 2003»
15 years 8 months ago
Towards Diagrammability and Efficiency in Event Sequence Languages
Industrial verification teams are actively developing suitable event sequence languages for hardware verification. Such languages must be expressive, designer friendly, and hardwar...
Kathi Fisler
ICWS
2008
IEEE
15 years 6 months ago
Communications Semantics for WSBPEL Processes
WSBPEL [2] opens up the possibility of applying a range of formal techniques to the verification of Web service behaviors from two points of view: constraints between activities w...
Walid Fdhila, Mohsen Rouached, Claude Godart