Sciweavers

186 search results - page 33 / 38
» Formal Modeling and Analysis of the Modbus Protocol
Sort
View
ERSHOV
2009
Springer
13 years 5 months ago
Applicability of the BLAST Model Checker: An Industrial Case Study
Model checking of software has been a very active research topic recently. As a result, a number of software model checkers have been developed for analysis of software written in ...
Emanuel Kolb, Ondrej Sery, Roland Weiss
ENTCS
2007
158views more  ENTCS 2007»
13 years 7 months ago
Abstraction and Completeness for Real-Time Maude
ion and Completeness for Real-Time Maude Peter Csaba ¨Olveczky a,b and Jos´e Meseguer b a Department of Informatics, University of Oslo b Department of Computer Science, Universi...
Peter Csaba Ölveczky, José Meseguer
FSTTCS
2003
Springer
14 years 17 days ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
CORR
2006
Springer
116views Education» more  CORR 2006»
13 years 7 months ago
Quantitative Measurements of the Influence of Participant Roles during Peer Review Meetings
Peer review meetings (PRMs) are formal meetings during which peers systematically analyze artifacts to improve their quality and report on non-conformities. This paper presents an...
Patrick d'Astous, Pierre N. Robillard, Franç...
ICNP
2005
IEEE
14 years 29 days ago
On Understanding of Transient Interdomain Routing Failures
The convergence time of the interdomain routing protocol, BGP, can last as long as 30 minutes [14,15]. Yet, routing behavior during BGP route convergence is poorly understood. BGP...
Feng Wang, Lixin Gao, Jia Wang, Jian Qiu