Sciweavers

297 search results - page 10 / 60
» Model Checking Guarded Protocols
Sort
View
ENTCS
2008
59views more  ENTCS 2008»
13 years 10 months ago
A Model Checking Approach to Protocol Conversion
Roopak Sinha, Partha S. Roop, Samik Basu
CSFW
2004
IEEE
14 years 1 months ago
Symbolic Model Checking the Knowledge of the Dining Cryptographers
This paper describes how symbolic techniques (in particular, OBDD's) may be used to to implement an algorithm for model checking specifications in the logic of knowledge for ...
Ron van der Meyden, Kaile Su
RTAS
2005
IEEE
14 years 3 months ago
A Real-Time Performance Comparison of Distributable Threads and Event Channels
No one middleware communication model completely solves the problem of ensuring schedulability in every DRE system. Furthermore, there have been few studies to date of the trade-o...
Yuanfang Zhang, Bryan Thrall, Stephen Torri, Chris...
DSN
2004
IEEE
14 years 1 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...