Sciweavers

372 search results - page 30 / 75
» Model Checking Commitment Protocols
Sort
View
ACSC
2007
IEEE
14 years 21 days ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
ICNS
2006
IEEE
14 years 2 months ago
MojaveComm: A Robust Group Communication Library for Grid Environments
This paper introduces a fault-tolerant group communication protocol that is aimed at grid and wide area environments. The protocol has two layers. The lower layer provides a total...
Cristian Tapus, David A. Noblet, Jason Hickey
ENTCS
2006
136views more  ENTCS 2006»
13 years 8 months ago
Automated Game Analysis via Probabilistic Model Checking: a case study
It has been recognised for some time that there are close links between the various logics developed for the analysis of multi-agent systems and the many game-theoretic models dev...
Paolo Ballarini, Michael Fisher, Michael Wooldridg...
SIGMETRICS
2008
ACM
130views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Using probabilistic model checking in systems biology
Probabilistic model checking is a formal verification framework for systems which exhibit stochastic behaviour. It has been successfully applied to a wide range of domains, includ...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
RTSS
1997
IEEE
14 years 26 days ago
On-the-fly symbolic model checking for real-time systems
This paper presents an on-the-fly and symbolic algorithm for checking whether a timed automaton satisfies a formula of a timed temporal logic which is more expressive than TCTL....
Ahmed Bouajjani, Stavros Tripakis, Sergio Yovine