Sciweavers

282 search results - page 41 / 57
» Verifying Commit-Atomicity Using Model-Checking
Sort
View
FDL
2004
IEEE
15 years 3 months ago
A Formal Verification Approach for IP-based Designs
This paper proposes a formal verification methodology which is smoothly integrated with component-based system-level design, using a divide and conquer approach. The methodology a...
Daniel Karlsson, Petru Eles, Zebo Peng
ADAEUROPE
2005
Springer
15 years 5 months ago
Extending Ravenscar with CSP Channels
Abstract. The Ravenscar Profile is a restricted subset of the Ada tasking model, designed to meet the requirements of producing analysable and deterministic code. A central featur...
Diyaa-Addein Atiya, Steve King
AGP
2010
IEEE
15 years 3 months ago
The Transformational Approach to Program Development
We present an overview of the program transformation techniques which have been proposed over the past twenty-five years in the context of logic programming. We consider the appro...
Alberto Pettorossi, Maurizio Proietti, Valerio Sen...
CHARME
2003
Springer
129views Hardware» more  CHARME 2003»
15 years 4 months ago
On the Correctness of an Intrusion-Tolerant Group Communication Protocol
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
Mohamed Layouni, Jozef Hooman, Sofiène Taha...
ECMDAFA
2007
Springer
100views Hardware» more  ECMDAFA 2007»
15 years 5 months ago
Reverse Engineering Models from Traces to Validate Distributed Systems - An Industrial Case Study
The paper targets the applicability of model-driven methodologies to the validation of complex systems and presents a case study of a mobile radio network. Validation relies on the...
Andreas Ulrich, Alexandre Petrenko