Sciweavers

1138 search results - page 109 / 228
» First-Order Model Checking Problems Parameterized by the Mod...
Sort
View
ACSAC
2002
IEEE
14 years 27 days ago
Representing TCP/IP Connectivity For Topological Analysis of Network Security
The individual vulnerabilities of hosts on a network can be combined by an attacker to gain access that would not be possible if the hosts were not interconnected. Currently avail...
Ronald W. Ritchey, Brian O'Berry, Steven Noel
CONCUR
2007
Springer
13 years 12 months ago
Temporal Antecedent Failure: Refining Vacuity
We re-examine vacuity in temporal logic model checking. We note two disturbing phenomena in recent results in this area. The first indicates that not all vacuities detected in prac...
Shoham Ben-David, Dana Fisman, Sitvanit Ruah
SPIN
2000
Springer
13 years 11 months ago
A Language Framework for Expressing Checkable Properties of Dynamic Software
Research on how to reason about correctness properties of software systems using model checking is advancing rapidly. Work on exnite-state models from program source code and on ab...
James C. Corbett, Matthew B. Dwyer, John Hatcliff,...
FORTE
2007
13 years 9 months ago
Transactional Reduction of Component Compositions
Behavioural protocols are beneficial to Component-Based Software Engineering and Service-Oriented Computing as they foster automatic procedures for discovery, composition, composi...
Serge Haddad, Pascal Poizat
ACL
2008
13 years 9 months ago
Phrase Table Training for Precision and Recall: What Makes a Good Phrase and a Good Phrase Pair?
In this work, the problem of extracting phrase translation is formulated as an information retrieval process implemented with a log-linear model aiming for a balanced precision an...
Yonggang Deng, Jia Xu, Yuqing Gao