Sciweavers

4305 search results - page 49 / 861
» Analysing Protocol Implementations
Sort
View
DAGSTUHL
2007
13 years 10 months ago
Implementing RPO and POLO using SAT
Abstract. Well-founded orders are the most basic, but also most important ingredient to virtually all termination analyses. Numerous fully automated search algorithms for these cla...
Peter Schneider-Kamp, Carsten Fuhs, René Th...
JCAL
2002
65views more  JCAL 2002»
13 years 8 months ago
Models of pedagogical implementation of ICT in Israeli schools
The paper analyses the data collected in 10 schools in Israel which have incorporated ICT in unique ways and have succeeded in devising innovative classroom pedagogies and changes ...
David Mioduser, Rafi Nachmias, D. Tubin, A. Forkos...
FUIN
2008
107views more  FUIN 2008»
13 years 8 months ago
Modelling and Simulation of Quantum Teleportation and Dense Coding Using Predicate/Transition-Nets
Reachability analysis is one of the most successful methods used in design and validation of protocols for classical communication, whereas the predicate/transition-net formalism i...
Kimmo Varpaaniemi, Leo Ojala
CORR
2011
Springer
175views Education» more  CORR 2011»
13 years 17 days ago
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol descripti...
Mihhail Aizatulin, Andrew D. Gordon, Jan Jürj...
CLIMA
2011
12 years 8 months ago
Verifying Team Formation Protocols with Probabilistic Model Checking
Multi-agent systems are an increasingly important software paradigm and in many of its applications agents cooperate to achieve a particular goal. This requires the design of effi...
Taolue Chen, Marta Z. Kwiatkowska, David Parker, A...