Sciweavers

2873 search results - page 204 / 575
» Model Checking and the Mu-calculus
Sort
View
147
Voted
ICSE
1999
IEEE-ACM
15 years 8 months ago
Data Flow Analysis for Checking Properties of Concurrent Java Programs
In this paper we show how the FLAVERS data flow analysis technique, originally formulated for programs with the rendezvous model of concurrency, can be applied to concurrent Java...
Gleb Naumovich, George S. Avrunin, Lori A. Clarke
134
Voted
FMCAD
2009
Springer
15 years 8 months ago
Industrial strength refinement checking
This paper discusses a methodology used on an industrial hardware development project to validate various cache-coherence protocol components. The idea is to use a high level model...
Jesse D. Bingham, John Erickson, Gaurav Singh, Fle...
MTV
2003
IEEE
109views Hardware» more  MTV 2003»
15 years 10 months ago
A Methodology for Validation of Microprocessors using Equivalence Checking
As embedded systems continue to face increasingly higher performance requirements, deeply pipelined processor architectures are being employed to meet desired system performance. ...
Prabhat Mishra, Nikil D. Dutt
SAINT
2002
IEEE
15 years 9 months ago
Internet Mail Transfer and Check System Based on Intelligence Mobile Agents
The Simple Mail Transfer Protocol (SMTP) based E-mail system is the most popular application in today’s Internet world, but there are many dark clouds at the edge of the sunshin...
Li Cheng, Wang Weinong
ESORICS
2008
Springer
15 years 6 months ago
Remote Integrity Check with Dishonest Storage Server
We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server,...
Ee-Chien Chang, Jia Xu