Sciweavers

336 search results - page 7 / 68
» Implementing CCS in Maude
Sort
View
AMAST
2006
Springer
13 years 11 months ago
ITP/OCL: A Rewriting-Based Validation Tool for UML+OCL Static Class Diagrams
Abstract. In this paper we present the ITP/OCL tool, a rewritingbased tool that supports automatic validation of UML class diagrams with respect to OCL constraints. Its implementat...
Manuel Clavel, Marina Egea
ATVA
2008
Springer
115views Hardware» more  ATVA 2008»
13 years 9 months ago
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...
Guoqiang Li, Mizuhito Ogawa
POPL
2005
ACM
14 years 8 months ago
Formal prototyping in early stages of protocol design
Network protocol design is usually an informal process where debugging is based on successive iterations of a prototype implementation. The feedback provided by a prototype can be...
Alwyn Goodloe, Carl A. Gunter, Mark-Oliver Stehr
FORTE
2010
13 years 9 months ago
Grouping Nodes in Wireless Sensor Networks Using Coalitional Game Theory
Wireless sensor networks are typically ad-hoc networks of resource-constrained nodes; in particular, the nodes are limited in power resources. It can be difficult and costly to rep...
Fatemeh Kazemeyni, Einar Broch Johnsen, Olaf Owe, ...
FM
2009
Springer
154views Formal Methods» more  FM 2009»
13 years 5 months ago
Specification and Verification of Web Applications in Rewriting Logic
Abstract. This paper presents a Rewriting Logic framework that formalizes the interactions between Web servers and Web browsers through icating protocol abstracting HTTP. The propo...
María Alpuente, Demis Ballis, Daniel Romero