Sciweavers

123 search results - page 15 / 25
» A case study on the automated verification of groupware prot...
Sort
View
CADE
2008
Springer
14 years 7 months ago
Specification Predicates with Explicit Dependency Information
Specifications of programs use auxiliary symbols to encapsulate concepts for a variety of reasons: readability, reusability, structuring and, in particular, for writing recursive d...
Richard Bubel, Reiner Hähnle, Peter H. Schmit...
SIGMETRICS
2008
ACM
130views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
Using probabilistic model checking in systems biology
Probabilistic model checking is a formal verification framework for systems which exhibit stochastic behaviour. It has been successfully applied to a wide range of domains, includ...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
MR
2010
120views Robotics» more  MR 2010»
13 years 5 months ago
Automated inspection and classification of flip-chip-contacts using scanning acoustic microscopy
Industrial applications often require failure analysis methods working non-destructively, enabling either a rapid quality control or fault isolation and defect localization prior ...
S. Brand, P. Czurratis, P. Hoffrogge, M. Petzold
JCS
2006
157views more  JCS 2006»
13 years 7 months ago
Analysis of probabilistic contract signing
We present three case studies, investigating the use of probabilistic model checking to automatically analyse properties of probabilistic contract signing protocols. We use the pr...
Gethin Norman, Vitaly Shmatikov
CSL
2010
Springer
13 years 8 months ago
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
Abstract. We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the analysis of cryptographic prot...
David A. Basin, Cas J. F. Cremers