Sciweavers

3147 search results - page 533 / 630
» Open-Source Model Checking
Sort
View
JCS
2010
80views more  JCS 2010»
13 years 2 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
TCAD
2010
121views more  TCAD 2010»
13 years 2 months ago
Translation Validation of High-Level Synthesis
The growing complexity of systems and their implementation into silicon encourages designers to look for model designs at higher levels of abstraction and then incrementally build ...
Sudipta Kundu, Sorin Lerner, Rajesh K. Gupta
IJDST
2011
117views more  IJDST 2011»
12 years 11 months ago
Integrating Production Automation Expert Knowledge Across Engineering Domains
The engineering of complex production automation systems involves experts from several backgrounds, such as mechanical, electrical, and software engineering. The production automa...
Thomas Moser, Stefan Biffl, Wikan Danar Sunindyo, ...
BPM
2011
Springer
295views Business» more  BPM 2011»
12 years 7 months ago
Compliance by Design for Artifact-Centric Business Processes
Compliance to legal regulations, internal policies, or best practices is becoming a more and more important aspect in business processes management. Compliance requirements are usu...
Niels Lohmann
ECCV
2004
Springer
14 years 9 months ago
Shape Reconstruction from 3D and 2D Data Using PDE-Based Deformable Surfaces
In this paper, we propose a new PDE-based methodology for deformable surfaces that is capable of automatically evolving its shape to capture the geometric boundary of the data and ...
Ye Duan, Liu Yang, Hong Qin, Dimitris Samaras