Sciweavers

194 search results - page 24 / 39
» Rule-Based Runtime Verification
Sort
View
CAV
2009
Springer
157views Hardware» more  CAV 2009»
14 years 10 months ago
Explaining Counterexamples Using Causality
Abstract. When a model does not satisfy a given specification, a counterexample is produced by the model checker to demonstrate the failure. A user must then examine the counterexa...
Ilan Beer, Shoham Ben-David, Hana Chockler, Avigai...
SAS
2000
Springer
14 years 1 months ago
A Transformational Approach for Generating Non-linear Invariants
Computing invariants is the key issue in the analysis of infinite-state systems whether analysis means testing, verification or parameter synthesis. In particular, methods that all...
Saddek Bensalem, Marius Bozga, Jean-Claude Fernand...
COMGEO
2010
ACM
14 years 1 months ago
Access control systems for spatial data infrastructures and their administration
Today sophisticated concepts, languages and frameworks exist, that allow implementing powerful fine grained access control systems for protecting Web Services and spatial data in ...
Jan Herrmann
ATAL
2008
Springer
13 years 12 months ago
Being a part of the crowd: towards validating VR crowds using presence
Crowd simulation models are currently lacking a commonly accepted validation method. In this paper, we propose level of presence achieved by a human in a virtual environment (VE) ...
Nuria Pelechano, Catherine Stocker, Jan M. Allbeck...
ICFP
2005
ACM
14 years 9 months ago
A principled approach to operating system construction in Haskell
We describe a monadic interface to low-level hardware features that is a suitable basis for building operating systems in Haskell. The interface includes primitives for controllin...
Thomas Hallgren, Mark P. Jones, Rebekah Leslie, An...