In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
Reliable multicast protocols can strongly simplify the design of distributed applications. However, it is hard to sustain a high multicast throughput when groups are large and het...
Maude has revealed itself as a powerful tool for implementing different kinds of semantics so that quick prototypes are available for trying examples and proving properties. In th...
Fernando Rosa Velardo, Clara Segura, Alberto Verde...
Abstract. We consider the verification of a simple pipelined microprocessor in Maude, by implementing an equational theoretical model of systems. Maude is an equationally-based la...
The correct and ecient management of data in distributed databases or mobile computing environments is dicult. Communication disruptions within such systems render the execution o...
Paul A. Jensen, Monica Brockmeyer, Nandit Soparkar