Sciweavers

276 search results - page 28 / 56
» Model Checking Groupware Protocols
Sort
View
FMCAD
2009
Springer
14 years 2 months ago
Industrial strength refinement checking
This paper discusses a methodology used on an industrial hardware development project to validate various cache-coherence protocol components. The idea is to use a high level model...
Jesse D. Bingham, John Erickson, Gaurav Singh, Fle...
ICMCS
2000
IEEE
126views Multimedia» more  ICMCS 2000»
14 years 3 months ago
A Cooperative Playback System for On-Demand Multimedia Sessions over Internet
IP multicast has fueled an assortment of large-scale applications over the Internet ranging from interactive video conferencing to whiteboards to video recording on-demand systems...
Giancarlo Fortino, Libero Nigro
CSFW
2009
IEEE
14 years 2 months ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
EUROMICRO
2007
IEEE
14 years 5 months ago
Partial Verification of Software Components: Heuristics for Environment Construction
Code model checking of software components suffers from the well-known problem of state explosion when applied to highly parallel components, despite the fact that a single compon...
Pavel Parizek, Frantisek Plasil
ICALP
2001
Springer
14 years 3 months ago
Symbolic Trace Analysis of Cryptographic Protocols
A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
Michele Boreale