Sciweavers

691 search results - page 72 / 139
» Modeling the Case Study with LDL and Implementing it with LD...
Sort
View
CDC
2009
IEEE
151views Control Systems» more  CDC 2009»
14 years 23 days ago
A poset framework to model decentralized control problems
— In this paper we use partially ordered sets (posets) to study decentralized control problems arising in different settings. We show that time delayed systems with certain dela...
Parikshit Shah, Pablo A. Parrilo
IH
1999
Springer
14 years 10 days ago
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast
Abstract. Traditionally, cryptographic protocols are described as a sequence of steps, in each of which one principal sends a message to another. It is assumed that the fundamental...
Frank Stajano, Ross J. Anderson
APSEC
2004
IEEE
13 years 11 months ago
An Approach to Detecting Domain Errors Using Formal Specification-Based Testing
Domain testing, a technique for testing software or portions of software dominated by numerical processing, is intended to detect domain errors that usually arise from incorrect i...
Yuting Chen, Shaoying Liu
FM
2008
Springer
171views Formal Methods» more  FM 2008»
13 years 9 months ago
Assume-Guarantee Verification for Interface Automata
Interface automata provide a formalism capturing the high level interactions between software components. Checking compatibility, and other safety properties, in an automata-based ...
Michael Emmi, Dimitra Giannakopoulou, Corina S. Pa...
ASE
2007
121views more  ASE 2007»
13 years 8 months ago
Computer-aided Support for Secure Tropos
In earlier work, we have introduced Secure Tropos, a requirements engineering methodology that extends the Tropos methodology and is intended for the design and analysis of securit...
Fabio Massacci, John Mylopoulos, Nicola Zannone