Sciweavers

1796 search results - page 144 / 360
» An Approach to Compositional Model Checking
Sort
View
DATE
2008
IEEE
85views Hardware» more  DATE 2008»
14 years 5 months ago
Improved Visibility in One-to-Many Trace Concretization
We present an improved algorithm for concretization of abstract eres in abstraction refinement-based invariant checking. The algorithm maps each transition of the abstract error ...
Kuntal Nanshi, Fabio Somenzi
ICC
2007
IEEE
118views Communications» more  ICC 2007»
14 years 5 months ago
Service Roaming over Mobile Networks: A Reality Check
—Today, international mobile roaming (IMR) is experiencing changes both in terms of technology and business models. Traditionally, voice and SMS have been the only services offer...
K. R. Renjish Kumar
DFG
2004
Springer
14 years 2 months ago
Verification of PLC Programs Given as Sequential Function Charts
Programmable Logic Controllers (PLC) are widespread in the manufacturing and processing industries to realize sequential procedures and to avoid safety-critical states. For the spe...
Nanette Bauer, Sebastian Engell, Ralf Huuck, Sven ...
VLDB
1998
ACM
82views Database» more  VLDB 1998»
14 years 3 months ago
Resource Scheduling for Composite Multimedia Objects
Scheduling algorithms for composite multimedia presentations need to ensure that the user-defined synchronization constraints for the various presentation components are met. This...
Minos N. Garofalakis, Yannis E. Ioannidis, Banu &O...
JCS
2002
94views more  JCS 2002»
13 years 10 months ago
Model-Based Analysis of Configuration Vulnerabilities
Vulnerability analysis is concerned with the problem of identifying weaknesses in computer systems that can be exploited to compromise their security. In this paper we describe a ...
C. R. Ramakrishnan, R. C. Sekar