Sciweavers

984 search results - page 62 / 197
» Experimenting with Multi-Level Models in a Two-Level Modelin...
Sort
View
141
Voted
ENTCS
2007
119views more  ENTCS 2007»
15 years 3 months ago
Interpolant Learning and Reuse in SAT-Based Model Checking
Bounded Model Checking (BMC) is one of the most paradigmatic practical applications of Boolean Satisfiability (SAT). The utilization of SAT in model checking has allowed signifi...
João Marques-Silva
141
Voted
WSC
2000
15 years 5 months ago
Teaching system modeling, simulation and validation
Simulation is used in the design process of dynamic systems. The results of simulation are employed for validating a model, and they are helpful for the improvement of the design ...
Jörg Desel
121
Voted
FC
2004
Springer
88views Cryptology» more  FC 2004»
15 years 9 months ago
Mental Models of Computer Security
Improved computer security requires improvements in risk communication to naive end users. Efficacy of risk communication depends not only on the nature of the risk, but also on t...
L. Jean Camp
116
Voted
ACSAC
2005
IEEE
15 years 9 months ago
Model Checking An Entire Linux Distribution for Security Violations
Software model checking has become a popular tool for verifying programs’ behavior. Recent results suggest that it is viable for finding and eradicating security bugs quickly. ...
Benjamin Schwarz, Hao Chen, David Wagner, Jeremy L...
ISSTA
2009
ACM
15 years 8 months ago
Run-time conformance checking of mobile and distributed systems using executable models
This paper describes an approach for conformance testing of mobile and distributed systems. The approach is based on kiltera — a novel, high-level language supporting the descri...
Ahmad A. Saifan, Ernesto Posse, Jürgen Dingel