Sciweavers

217 search results - page 35 / 44
» Automatic Termination
Sort
View
FOSAD
2009
Springer
14 years 3 months ago
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
We introduce the Open-source Fixed-point Model Checker OFMC for symbolic security protocol analysis, which extends the Onthe-fly Model Checker (the previous OFMC). The native inpu...
Sebastian Mödersheim, Luca Viganò
ICFEM
2009
Springer
14 years 3 months ago
Circular Coinduction with Special Contexts
Coinductive proofs of behavioral equivalence often require human ingenuity, in that one is expected to provide a “good” relation extending one’s goal with additional lemmas, ...
Dorel Lucanu, Grigore Rosu
OTM
2009
Springer
14 years 3 months ago
Revisiting the Behavior of Fault and Compensation Handlers in WS-BPEL
When automating work, it is often desirable to compensate completed work by undoing the work done by one or more activities. In the context of workflow, where compensation actions...
Rania Khalaf, Dieter Roller, Frank Leymann
IPPS
2008
IEEE
14 years 3 months ago
Absolute Slicing in Peer-to-peer Systems
Peer-to-peer (P2P) systems are slowly moving from application-specific architectures to a generic serviceoriented design framework. The idea is to allow a dynamic collection of P...
Alberto Montresor, Roberto Zandonati
GECCO
2007
Springer
177views Optimization» more  GECCO 2007»
14 years 2 months ago
On the behavioral diversity of random programs
Generating a random sampling of program trees with specified function and terminal sets is the initial step of many program evolution systems. I present a theoretical and experim...
Moshe Looks