Sciweavers

457 search results - page 46 / 92
» Distributed verification with LoLA
Sort
View
JUCS
2008
189views more  JUCS 2008»
13 years 7 months ago
Structural Performance Evaluation of Multi-Agent Systems
: This paper is dedicated to the issue of structural performance of multi-agent platforms. Due to the wide range of all available architectures, we have concentrated only on Java R...
Dariusz Król, Michal Zelmozer
JUCS
2006
124views more  JUCS 2006»
13 years 7 months ago
Variations on Itai-Rodeh Leader Election for Anonymous Rings and their Analysis in PRISM
Abstract: We present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh [Itai and Rodeh 1...
Wan Fokkink, Jun Pang
ADT
2005
13 years 7 months ago
Assembling components with behavioural contracts
Component based design is a new paradigm to build distributed systems and applications. The problem of compositional verification of such systems is however still open. We investig...
Cyril Carrez, Alessandro Fantechi, Elie Najm
JSW
2007
126views more  JSW 2007»
13 years 7 months ago
Supporting UML Sequence Diagrams with a Processor Net Approach
— UML sequence diagrams focus on the interaction between different classes. For distributed real time transaction processing it is possible to end up with complex sequence diagra...
Tony Spiteri Staines
IDEAL
2010
Springer
13 years 5 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...