Sciweavers

39 search results - page 4 / 8
» Integrating Automated and Interactive Protocol Verification
Sort
View
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
13 years 11 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
ACSD
2006
IEEE
109views Hardware» more  ACSD 2006»
13 years 9 months ago
Synthesis of Synchronous Interfaces
Reuse of IP blocks has been advocated as a means to conquer the complexity of today's system-on-chip (SoC) designs. Component integration and verification in such systems is ...
Purandar Bhaduri, S. Ramesh
ESEC
1997
Springer
13 years 11 months ago
Verification of Liveness Properties Using Compositional Reachability Analysis
The software architecture of a distributed program can be represented by a hierarchical composition of subsystems, with interacting processes at the leaves of the hierarchy. Compo...
Shing-Chi Cheung, Dimitra Giannakopoulou, Jeff Kra...
ATAL
2008
Springer
13 years 9 months ago
Ontology-based test generation for multiagent systems
This paper investigates software agents testing, and in particular how to automate test generation. We propose a novel approach, which takes advantage of agent interaction ontolog...
Duy Cu Nguyen, Anna Perini, Paolo Tonella
POPL
2002
ACM
14 years 7 months ago
Mining specifications
Program verification is a promising approach to improving program quality, because it can search all possible program executions for specific errors. However, the need to formally...
Glenn Ammons, James R. Larus, Rastislav Bodí...