Sciweavers

1809 search results - page 114 / 362
» Software Model Checking Using Linear Constraints
Sort
View
JCS
2010
80views more  JCS 2010»
13 years 4 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
CSCLP
2004
Springer
14 years 2 months ago
A Note on Bilattices and Open Constraint Programming
Abstract. We propose to use bilattice as a constraint valuation structure in order to represent truth and belief at the same time. A bilattice is a set which owns two lattices orde...
Arnaud Lallouet
ICASSP
2011
IEEE
13 years 27 days ago
Directions-of-arrival estimation using a sparse spatial spectrum model with uncertainty
This paper is concerned with the estimation of the directionsof-arrival (DOA) of narrowband sources using a sparse spatial spectral model, when the model itself is not precise. Wh...
Jimeng Zheng, Mostafa Kaveh
SARA
2009
Springer
14 years 1 months ago
Rewriting Constraint Models with Metamodels
An important challenge in constraint programming is to rewrite constraint models into executable programs calculating the solutions. This phase of constraint processing may requir...
Raphaël Chenouard, Laurent Granvilliers, Rica...
IASSE
2004
13 years 10 months ago
Execution of A Requirement Model in Software Development
Latest research results have shown that requirements errors have a prolonged impact on software development and that they are more expensive to fix during later stages than early ...
Wuwei Shen, Mohsen Guizani, Zijiang Yang, Kevin J....