Sciweavers

276 search results - page 11 / 56
» Model Checking Groupware Protocols
Sort
View
ECBS
2006
IEEE
135views Hardware» more  ECBS 2006»
14 years 2 months ago
Model Checking Procedures for Infinite State Systems
The paper depicts experiments and results with preditraction based verification applied to infinite state Predicate abstraction is a method for automatic tion of abstract state sp...
Nikola Bogunovi, Edgar Pek
AAI
2004
114views more  AAI 2004»
13 years 10 months ago
Model Checking A Knowledge Exchange Scenario
We are interested in applying model checking techniques to the verification of communication protocols which require safe communication. Typically, in such scenarios, one desires ...
Sieuwert van Otterloo, Wiebe Der, Michael Wooldrid...
IPPS
2008
IEEE
14 years 4 months ago
Formal modeling and analysis of real-time resource-sharing protocols in Real-Time Maude
This paper presents general techniques for formally modeling, simulating, and model checking real-time resource-sharing protocols in Real-Time Maude. The “scheduling subset” o...
Peter Csaba Ölveczky, Pavithra Prabhakar, Xue...
JUCS
2007
108views more  JUCS 2007»
13 years 10 months ago
Integrating Module Checking and Deduction in a Formal Proof for the Perlman Spanning Tree Protocol (STP)
: In the IEEE 802.1D standard for the Media Access Control layer (MAC layer) bridges, there is an STP (Spanning Tree Protocol) definition, based on the algorithm that was proposed...
Hossein Hojjat, Hootan Nakhost, Marjan Sirjani
SAFECOMP
2007
Springer
14 years 4 months ago
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees
In existing security model-checkers the intruder’s behavior is defined as a message deducibility rule base governing use of eavesdropped information, with the aim to find out a m...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...