We present a novel approach which facilitates formal verification of component-based software application families using model checking. This approach enables effective composition...
The capacity of wireless communication architectures equipped with multiple transmit and receive antennas and impaired by both noise and cochannel interference is studied. We find ...
The paper introduces the new concept of symmetric transparent BIST for RAMs. This concept allows to skip the signature prediction phase of conventional transparent BIST approaches...
Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automa...
Maurice H. ter Beek, Gabriele Lenzini, Marinella P...
In e-Science experiments, it is vital to record the experimental process for later use such as in interpreting results, verifying that the correct process took place or tracing whe...
Simon Miles, Paul T. Groth, Miguel Branco, Luc Mor...