Performance analysis has many advantages in theory compared to simulation for the validation of complex embedded systems, but is rarely used in practice. To make analysis more att...
The formal analysis of cryptographic protocols has developed into a comprehensive body of knowledge, building on a wide variety of formalisms and treating a diverse range of securi...
Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider
This paper revisits the lattice-based thesaurus models which Margaret Masterman used for machine translation in the 1950’s and 60’s. Masterman’s notions are mapped onto moder...
—This paper introduces an integrated modeling and analysis formalism based on colored Petri nets (CPNs) for supply chain configuration and evaluation. The structural changes of d...
Lianfeng Zhang, Xiao You, Jianxin Jiao, Petri Helo
This paper presents a formal approach based on the RTLOTOS formal description technique for the semantic verification of SMIL documents. The reachability analysis of RT-LOTOS spec...
Paulo Nazareno Maia Sampaio, C. A. S. Santos, Jean...