Sciweavers

528 search results - page 46 / 106
» Construction of concrete verification models from C
Sort
View
NSDI
2004
13 years 10 months ago
Model Checking Large Network Protocol Implementations
Network protocols must work. The effects of protocol specification or implementation errors range from reduced performance, to security breaches, to bringing down entire networks....
Madanlal Musuvathi, Dawson R. Engler
CCR
2006
112views more  CCR 2006»
13 years 8 months ago
The probe gap model can underestimate the available bandwidth of multihop paths
The Probe Gap Model (PGM) was proposed as a lightweight and fast available bandwidth estimation method. Measurement tools such as Delphi and Spruce are based on PGM. Compared to e...
Li Lao, Constantine Dovrolis, M. Y. Sanadidi
CN
1999
163views more  CN 1999»
13 years 8 months ago
Operational Semantics for MSC'96
Recently, the ITU-standardised specification language Message Sequence Chart has been extended with constructs for more complete and structured specifications. The new version of ...
Sjouke Mauw, Michel A. Reniers
AGI
2008
13 years 10 months ago
Cognitive Primitives for Automated Learning
Artificial Intelligence deals with the automated simulation of human intelligent behavior. Various aspects of human faculties are tackled using computational models. It is clear th...
Sudharsan Iyengar
JUCS
2006
124views more  JUCS 2006»
13 years 8 months ago
Variations on Itai-Rodeh Leader Election for Anonymous Rings and their Analysis in PRISM
Abstract: We present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh [Itai and Rodeh 1...
Wan Fokkink, Jun Pang