Sciweavers

1239 search results - page 82 / 248
» Applying Model Checking to Concurrent UML Models
Sort
View
ATAL
2010
Springer
13 years 10 months ago
Model checking detectability of attacks in multiagent systems
Information security is vital to many multiagent system applications. In this paper we formalise the notion of detectability of attacks in a MAS setting and analyse its applicabil...
Ioana Boureanu, Mika Cohen, Alessio Lomuscio
ICECCS
2010
IEEE
161views Hardware» more  ICECCS 2010»
13 years 9 months ago
Model Checking Round-Based Distributed Algorithms
—In the field of distributed computing, there are many round-based algorithms to solve fundamental problems, such as leader election and distributed consensus. Due to the nature...
Xin An, Jun Pang
AAI
2004
114views more  AAI 2004»
13 years 8 months ago
Model Checking A Knowledge Exchange Scenario
We are interested in applying model checking techniques to the verification of communication protocols which require safe communication. Typically, in such scenarios, one desires ...
Sieuwert van Otterloo, Wiebe Der, Michael Wooldrid...
ICCAD
2005
IEEE
121views Hardware» more  ICCAD 2005»
14 years 5 months ago
Transition-by-transition FSM traversal for reachability analysis in bounded model checking
Abstract— In bounded model checking (BMC)-based verification flows lack of reachability constraints often leads to false negatives. At present, it is daily practice of a veri...
Minh D. Nguyen, Dominik Stoffel, Markus Wedler, Wo...
FATES
2004
Springer
14 years 2 months ago
Using Model Checking for Reducing the Cost of Test Generation
This paper presents a method for reducing the cost of test generation. A spanning set for a coverage criterion is a set of entities such that exercising every entity in the spannin...
Hyoung Seok Hong, Hasan Ural