Sciweavers

150 search results - page 12 / 30
» Checking Correctness of Transactional Behaviors
Sort
View
JSS
2007
105views more  JSS 2007»
13 years 8 months ago
Composing pattern-based components and verifying correctness
Designing large software systems out of reusable components has become increasingly popular. Although liberal composition of reusable components saves time and expense, many exper...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan, S...
CAV
2001
Springer
121views Hardware» more  CAV 2001»
14 years 1 months ago
A Practical Approach to Coverage in Model Checking
In formal verification, we verify that a system is correct with respect to a specification. When verification succeeds and the system is proven to be correct, there is still a q...
Hana Chockler, Orna Kupferman, Robert P. Kurshan, ...
KBSE
2002
IEEE
14 years 1 months ago
Deviation Analysis Through Model Checking
Inaccuracies, or deviations, in the measurements of monitored variables in a control system are facts of life that control software must accommodate—the software is expected to ...
Mats Per Erik Heimdahl, Yunja Choi, Michael W. Wha...
ICSE
2007
IEEE-ACM
14 years 8 months ago
Formal Software Analysis Emerging Trends in Software Model Checking
The study of methodologies and techniques to produce correct software has been active for four decades. During this period, researchers have developed and investigated a wide vari...
Matthew B. Dwyer, John Hatcliff, Robby, Corina S. ...
SAFECOMP
2007
Springer
14 years 2 months ago
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees
In existing security model-checkers the intruder’s behavior is defined as a message deducibility rule base governing use of eavesdropped information, with the aim to find out a m...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...