Sciweavers

19 search results - page 4 / 4
» Integrating Gandalf and HOL
Sort
View
PTS
2008
123views Hardware» more  PTS 2008»
13 years 8 months ago
Model-Based Firewall Conformance Testing
Firewalls are a cornerstone of todays security infrastructure for networks. Their configuration, implementing a firewall policy, is inherently complex, hard to understand, and diff...
Achim D. Brucker, Lukas Brügger, Burkhart Wol...
RTA
2010
Springer
13 years 11 months ago
Certified Subterm Criterion and Certified Usable Rules
Abstract. In this paper we present our formalization of two important termination techniques for term rewrite systems: the subterm criterion and the reduction pair processor in com...
Christian Sternagel, René Thiemann
POPL
2009
ACM
14 years 8 months ago
Verifying distributed systems: the operational approach
This work develops an integrated approach to the verification of behaviourally rich programs, founded directly on operational semantics. The power of the approach is demonstrated ...
Tom Ridge
RTSS
2008
IEEE
14 years 1 months ago
Merge-by-Wire: Algorithms and System Support
Automakers are trying to make vehicles more intelligent and safe by embedding processors which can be used to implement by-wire applications for taking smart decisions on the road...
Vipul Shingde, Gurulingesh Raravi, Ashish Gudhe, P...