Sciweavers

261 search results - page 17 / 53
» A New Unfolding Approach to LTL Model Checking
Sort
View
ICECCS
2007
IEEE
115views Hardware» more  ICECCS 2007»
13 years 11 months ago
On-the-fly model checking for C programs with extended CADP in FMICS-jETI
A current trend in the software engineering community is to integrate different tools in a friendly and powerful development environment for use by final users. This is also the c...
María-del-Mar Gallardo, Pedro Merino, Chris...
IFIP
2009
Springer
13 years 5 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
BIRTHDAY
2010
Springer
13 years 8 months ago
Model Checking Programmable Router Configurations
Programmable networks offer the ability to customize router behaviour at run time, thus providing new levels of flexibility for network administrators. We have developed a program...
Luca Zanolin, Cecilia Mascolo, Wolfgang Emmerich
MEMOCODE
2005
IEEE
14 years 1 months ago
Three-valued logic in bounded model checking
In principle, bounded model checking (BMC) leads to semidecision procedures that can be used to verify liveness properties and to falsify safety properties. If the procedures fail...
Tobias Schüle, Klaus Schneider
EUROMICRO
2000
IEEE
14 years 4 days ago
Formal Coverification of Embedded Systems Using Model Checking
The complexity of embedded systems is increasing rapidly. In consequence, new verification techniques that overcome the limitations of traditional methods and are suitable for har...
Luis Alejandro Cortés, Petru Eles, Zebo Pen...