Sciweavers

2878 search results - page 27 / 576
» Model Checking FTA
Sort
View
COMPSEC
2010
146views more  COMPSEC 2010»
13 years 7 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
SPIN
2010
Springer
13 years 6 months ago
Automatic Generation of Model Checking Scripts Based on Environment Modeling
When applying model checking to the design models of the embedded systems, it is necessary to model not only the behavior of the target system but also that of the environment inte...
Kenro Yatake, Toshiaki Aoki
EPEW
2006
Springer
13 years 11 months ago
Model Checking for a Class of Performance Properties of Fluid Stochastic Models
Abstract. Recently, there is an explosive development of fluid approaches to computer and distributed systems. These approaches are inherently stochastic and generate continuous st...
Manuela L. Bujorianu, Marius C. Bujorianu
FMOODS
2008
13 years 9 months ago
Modeling and Model Checking Software Product Lines
Abstract. Software product line engineering combines the individual developments of systems to the development of a family of systems consisting of common and variable assets. In t...
Alexander Gruler, Martin Leucker, Kathrin D. Schei...
CIE
2008
Springer
13 years 7 months ago
First-Order Model Checking Problems Parameterized by the Model
We study the complexity of the model checking problem, for fixed models A, over certain fragments L of first-order logic, obtained by restricting which of the quantifiers and boole...
Barnaby Martin