Sciweavers

285 search results - page 17 / 57
» Model Checking Contracts - A Case Study
Sort
View
ATAL
2010
Springer
13 years 10 months ago
Model checking detectability of attacks in multiagent systems
Information security is vital to many multiagent system applications. In this paper we formalise the notion of detectability of attacks in a MAS setting and analyse its applicabil...
Ioana Boureanu, Mika Cohen, Alessio Lomuscio
ICRE
1998
IEEE
14 years 1 months ago
Validating Requirements for Fault Tolerant Systems using Model Checking
Model checking is shown to be an effective tool in validating the behavior of a fault tolerant embedded spacecraft controller. The case study presented here at by judiciously abst...
Francis Schneider, Steve M. Easterbrook, John R. C...
ECIS
2001
13 years 10 months ago
Consultancy Engagement and E-Business Development - A Case Analysis of Australian SMEs
The majority of SMEs have neither the internal expertise nor financial resources to enable in-house development of e-business and therefore turn to the services of website design ...
Shirley Bode, Janice M. Burn
FUIN
2007
104views more  FUIN 2007»
13 years 8 months ago
Modelling and Checking Timed Authentication of Security Protocols
In this paper we offer a novel methodology for verifying correctness of (timed) security protocols. The idea consists in computing the time of a correct execution of a session and ...
Gizela Jakubowska, Wojciech Penczek
QEST
2010
IEEE
13 years 6 months ago
Automatic Compositional Reasoning for Probabilistic Model Checking of Hardware Designs
Adaptive techniques like voltage and frequency scaling, process variations and the randomness of input data contribute signi cantly to the statistical aspect of contemporary hardwa...
Jayanand Asok Kumar, Shobha Vasudevan