Sciweavers

673 search results - page 56 / 135
» A Model Checker for AADL
Sort
View
142
Voted
COMCOM
2008
145views more  COMCOM 2008»
15 years 3 months ago
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
113
Voted
ICSE
2007
IEEE-ACM
16 years 3 months ago
SCL: Static Enforcement and Exploration of Developer Intent in Source Code
Developers are often unaware of, or fail to respect, the intentions behind a design due to poor communication of design intent. SCL (Structural Constraint Language) helps develope...
Daqing Hou
122
Voted
CAV
2006
Springer
157views Hardware» more  CAV 2006»
15 years 7 months ago
Lazy Abstraction with Interpolants
traction with Interpolants K. L. McMillan Cadence Berkeley Labs Abstract. We describe a model checker for infinite-state sequential proased on Craig interpolation and the lazy abst...
Kenneth L. McMillan
128
Voted
ENTCS
2006
148views more  ENTCS 2006»
15 years 3 months ago
Towards the Semantics and Verification of BPEL4WS
Abstract. In this paper, we discuss the semantics of BPEL4WS language which is a de facto standard for specifying and execution workflow specification for web service composition a...
Geguang Pu, Xiangpeng Zhao, Shuling Wang, Zongyan ...
97
Voted
IFIP
2009
Springer
15 years 1 months ago
Game-Based Verification of Multi-Party Contract Signing Protocols
A multi-party contract signing (MPCS) protocol is used for a group of signers to sign a digital contract over a network. We analyse the protocols of Mukhamedov and Ryan (MR), and o...
Ying Zhang, Chenyi Zhang, Jun Pang, Sjouke Mauw