Sciweavers

285 search results - page 43 / 57
» Model Checking Contracts - A Case Study
Sort
View
IANDC
2007
107views more  IANDC 2007»
13 years 8 months ago
Task automata: Schedulability, decidability and undecidability
We present a model, task automata, for real time systems with non-uniformly recurring computation tasks. It is an extended version of timed automata with asynchronous processes th...
Elena Fersman, Pavel Krcál, Paul Pettersson...
TASE
2008
IEEE
14 years 3 months ago
Reasoning about Channel Passing in Choreography
Abstract Web services choreography describes global models of service interactions among a set of participants. For an interaction to be executed, the participants taken part in it...
Hongli Yang, Chao Cai, Liyang Peng, Xiangpeng Zhao...
ENTCS
2008
101views more  ENTCS 2008»
13 years 8 months ago
Improving Fault-based Conformance Testing
Fault-based conformance testing is a conformance testing strategy that relies on specific fault models. Previously, this mutation testing technique has been applied to protocol spe...
Bernhard K. Aichernig, Martin Weiglhofer, Franz Wo...
CORR
2009
Springer
242views Education» more  CORR 2009»
13 years 6 months ago
Adaptive Scheduling of Data Paths using Uppaal Tiga
Abstract. We apply Uppaal Tiga to automatically compute adaptive scheduling strategies for an industrial case study dealing with a state-of-the-art image processing pipeline of a p...
Israa AlAttili, Fred Houben, Georgeta Igna, Steffe...
JCS
2010
80views more  JCS 2010»
13 years 3 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...