Sciweavers

151 search results - page 25 / 31
» P-Semiflow Computation with Decision Diagrams
Sort
View
CONCUR
1999
Springer
13 years 11 months ago
Approximate Symbolic Model Checking of Continuous-Time Markov Chains
d abstract) Christel Baiera, Joost-Pieter Katoenb;c and Holger Hermannsc aLehrstuhl fur Praktische Informatik II, University of Mannheim 68131 Mannheim, Germany bLehrstuhl fur Info...
Christel Baier, Joost-Pieter Katoen, Holger Herman...
DAC
2010
ACM
13 years 11 months ago
Towards scalable system-level reliability analysis
State-of-the-art automatic reliability analyses as used in system-level design approaches mainly rely on Binary Decision Diagrams (BDDs) and, thus, face two serious problems: (1) ...
Michael Glaß, Martin Lukasiewycz, Christian ...
DSN
2008
IEEE
13 years 9 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
SAC
2005
ACM
14 years 1 months ago
Value-oriented design of service coordination processes: correctness and trust
The rapid growth of service coordination languages creates a need for methodological support for coordination design. Coordination design differs from workflow design because a ...
Roel Wieringa, Jaap Gordijn
SACMAT
2009
ACM
14 years 2 months ago
An algebra for fine-grained integration of XACML policies
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. ...
Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, ...