Sciweavers

152 search results - page 14 / 31
» Interactive verification of concurrent systems using symboli...
Sort
View
JCP
2008
116views more  JCP 2008»
13 years 7 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
EPIA
2003
Springer
14 years 23 days ago
jcc: Integrating Timed Default Concurrent Constraint Programming into Java
Abstract. This paper describes jcc, an integration of the timed default concurrent constraint programming framework [16] (Timed Default cc) into JAVA [7]. jcc is intended for use i...
Vijay A. Saraswat, Radha Jagadeesan, Vineet Gupta
NFM
2011
223views Formal Methods» more  NFM 2011»
13 years 2 months ago
Generating Data Race Witnesses by an SMT-Based Analysis
Abstract. Data race is one of the most dangerous errors in multithreaded programming, and despite intensive studies, it remains a notorious cause of failures in concurrent systems....
Mahmoud Said, Chao Wang, Zijiang Yang, Karem Sakal...
FMICS
2010
Springer
13 years 5 months ago
A Study of Shared-Memory Mutual Exclusion Protocols Using CADP
Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurr...
Radu Mateescu, Wendelin Serwe
DIMEA
2008
130views Multimedia» more  DIMEA 2008»
13 years 9 months ago
Iscore: a system for writing interaction
In this article, we present the development of research carried out to design a system of interactive scores for composition and execution, based on temporal constraints called Is...
Antoine Allombert, Myriam Desainte-Catherine, G&ea...