Sciweavers

1528 search results - page 103 / 306
» Performance Assertion Checking
Sort
View
IJISEC
2008
101views more  IJISEC 2008»
13 years 10 months ago
SAT-based model-checking for security protocols analysis
We present a model checking technique for security protocols based on a reduction to propositional logic. At the core of our approach is a procedure that, given a description of th...
Alessandro Armando, Luca Compagna
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
13 years 10 months ago
Analysis of a gossip protocol in PRISM
Gossip protocols have been proposed as a robust and efficient method for disseminating information throughout dynamically changing networks. We present an analysis of a gossip pro...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
TOPNOC
2008
13 years 10 months ago
TAPAs: A Tool for the Analysis of Process Algebras
Process Algebras are formalisms for modelling concurrent systems that permit mathematical reasoning with respect to a set of desired properties. TAPAs is a tool that can be used to...
Francesco Calzolai, Rocco De Nicola, Michele Loret...
SIGSOFT
2010
ACM
13 years 4 months ago
Analyzing hierarchical complex real-time systems
Specification and verification of real-time systems are important research topics which have practical implications. In this work, we present a self-contained toolkit to analyze r...
Yang Liu 0003, Jun Sun 0001, Jin Song Dong
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
14 years 1 months ago
Continual hashing for efficient fine-grain state inconsistency detection
Transaction-level modeling (TLM) allows a designer to save functional verification effort during the modular refinement of an SoC by reusing the prior implementation of a module a...
Jae W. Lee, Myron King, Krste Asanovic