Sciweavers

714 search results - page 57 / 143
» Certifying Model Checkers
Sort
View
COMCOM
2008
145views more  COMCOM 2008»
13 years 7 months ago
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
ICSE
2007
IEEE-ACM
14 years 7 months ago
SCL: Static Enforcement and Exploration of Developer Intent in Source Code
Developers are often unaware of, or fail to respect, the intentions behind a design due to poor communication of design intent. SCL (Structural Constraint Language) helps develope...
Daqing Hou
CAV
2006
Springer
157views Hardware» more  CAV 2006»
13 years 11 months ago
Lazy Abstraction with Interpolants
traction with Interpolants K. L. McMillan Cadence Berkeley Labs Abstract. We describe a model checker for infinite-state sequential proased on Craig interpolation and the lazy abst...
Kenneth L. McMillan
ENTCS
2006
148views more  ENTCS 2006»
13 years 7 months ago
Towards the Semantics and Verification of BPEL4WS
Abstract. In this paper, we discuss the semantics of BPEL4WS language which is a de facto standard for specifying and execution workflow specification for web service composition a...
Geguang Pu, Xiangpeng Zhao, Shuling Wang, Zongyan ...
IFIP
2009
Springer
13 years 5 months ago
Game-Based Verification of Multi-Party Contract Signing Protocols
A multi-party contract signing (MPCS) protocol is used for a group of signers to sign a digital contract over a network. We analyse the protocols of Mukhamedov and Ryan (MR), and o...
Ying Zhang, Chenyi Zhang, Jun Pang, Sjouke Mauw