Sciweavers

575 search results - page 96 / 115
» Formal Coverification of Embedded Systems Using Model Checki...
Sort
View
ICDCS
2007
IEEE
14 years 1 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
POPL
1990
ACM
13 years 11 months ago
Higher-Order Modules and the Phase Distinction
Typed -calculus is an important tool in programming language research because it provides an extensible framework for studying language features both in isolation and in their rel...
Robert Harper, John C. Mitchell, Eugenio Moggi
POPL
2011
ACM
12 years 10 months ago
Making prophecies with decision predicates
We describe a new algorithm for proving temporal properties expressed in LTL of infinite-state programs. Our approach takes advantage of the fact that LTL properties can often be...
Byron Cook, Eric Koskinen
ECMDAFA
2005
Springer
122views Hardware» more  ECMDAFA 2005»
14 years 27 days ago
Semantic Anchoring with Model Transformations
Model-Integrated Computing (MIC) is an approach to Model-Driven Architecture (MDA), which has been developed primarily for embedded systems. MIC places strong emphasis on the use o...
Kai Chen 0003, Janos Sztipanovits, Sherif Abdelwah...
MOMPES
2008
IEEE
14 years 1 months ago
Architectural Concurrency Equivalence with Chaotic Models
During its lifetime, embedded systems go through multiple changes to their runtime architecture. That is, threads, processes, and processor are added or removed to/from the softwa...
Dionisio de Niz