Sciweavers

1809 search results - page 104 / 362
» Software Model Checking Using Linear Constraints
Sort
View
I3E
2001
196views Business» more  I3E 2001»
13 years 10 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel
HICSS
1998
IEEE
169views Biometrics» more  HICSS 1998»
14 years 1 months ago
A Transmission-Constrained Unit Commitment Method
This paper presents a transmission-constrained unit commitment method using a Lagrangian relaxation approach. Based on a DC power flow model, the transmission constraints are form...
Chung-Li Tseng, Shmuel S. Oren, C. S. Cheng, C.-A....
IMCSIT
2010
13 years 6 months ago
Software and hardware in the loop component for an IEC 61850 Co-Simulation platform
The deployment of IEC61850 standard in the world of substation automation system brings to the use of specific strategies for architecture testing. To validate IEC61850 architectur...
Haffar Mohamad, Thiriet Jean Marc
AAAI
1996
13 years 10 months ago
Trajectory Constraints in Qualitative Simulation
We present a method for specifying temporal constraints on trajectories of dynamical systems and enforcing them during qualitative simulation. This capability can be used to focus...
Giorgio Brajnik, Daniel J. Clancy
CP
2009
Springer
14 years 9 months ago
Constraint-Based Optimal Testing Using DNNF Graphs
The goal of testing is to distinguish between a number of hypotheses about a systemfor example, dierent diagnoses of faults by applying input patterns and verifying or falsifying t...
Anika Schumann, Martin Sachenbacher, Jinbo Huang