Sciweavers

1228 search results - page 89 / 246
» Continuations, proofs and tests
Sort
View
WSC
2007
13 years 10 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
KI
2010
Springer
13 years 2 months ago
Differential Dynamic Logics
Hybrid systems are models for complex physical systems and are defined as dynamical systems with interacting discrete transitions and continuous evolutions along differential equa...
André Platzer
HYBRID
1998
Springer
14 years 10 days ago
Formal Verification of Safety-Critical Hybrid Systems
This paper investigates how formal techniques can be used for the analysis and verification of hybrid systems [1,5,7,16] -- systems involving both discrete and continuous behavior....
Carolos Livadas, Nancy A. Lynch
ECSQARU
2003
Springer
14 years 1 months ago
Decision Making Based on Sampled Disease Occurrence in Animal Herds
To make qualified decisions when extrapolating results from a survey sample with imprecise tests requires careful handling of uncertainty. Both the imprecise test and uncertainty ...
Michael Höhle, Erik Jørgensen
ASPDAC
2006
ACM
141views Hardware» more  ASPDAC 2006»
13 years 12 months ago
Depth-driven verification of simultaneous interfaces
The verification of modern computing systems has grown to dominate the cost of system design, often with limited success as designs continue to be released with latent bugs. This t...
Ilya Wagner, Valeria Bertacco, Todd M. Austin