Sciweavers

176 search results - page 20 / 36
» Formal Verification of Gate-Level Computer Systems
Sort
View
EDOC
2004
IEEE
13 years 11 months ago
Notations for the Specification and Verification of Composite Web Services
Availability of a wide variety of Web services over the Internet offers opportunities of providing new value added services built by composing them out of existing ones. Service c...
Simon J. Woodman, Doug J. Palmer, Santosh K. Shriv...
CAV
2009
Springer
206views Hardware» more  CAV 2009»
14 years 8 months ago
D-Finder: A Tool for Compositional Deadlock Detection and Verification
D-Finder tool implements a compositional method for the verification of component-based systems described in BIP language encompassing multi-party interaction. For deadlock detecti...
Saddek Bensalem, Marius Bozga, Thanh-Hung Nguyen, ...
DAGSTUHL
2008
13 years 9 months ago
The Grand Challenges and Myths of Neural-Symbolic Computation
The construction of computational cognitive models integrating the connectionist and symbolic paradigms of artificial intelligence is a standing research issue in the field. The co...
Luís C. Lamb
CCR
2000
78views more  CCR 2000»
13 years 7 months ago
Some guidelines for non-repudiation protocols
Non-repudiation protocols aim at preventing parties in a communication from falsely denying having taken part in that communication; for example, a non-repudiation protocol for di...
Panagiotis Louridas
ICTAI
1997
IEEE
13 years 11 months ago
GA-Based Performance Analysis of Network Protocols
This paper tackles the problem of analyzing the correctness and performance of a computer network protocol. Given the complexity of the problem, no currently used technique is abl...
Mario Baldi, Fulvio Corno, Maurizio Rebaudengo, Gi...