Sciweavers

2513 search results - page 126 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
ICFEM
2009
Springer
15 years 2 months ago
An Efficient Translation of Timed-Arc Petri Nets to Networks of Timed Automata
Bounded timed-arc Petri nets with read-arcs were recently proven equivalent to networks of timed automata, though the Petri net model cannot express urgent behaviour and the descri...
Joakim Byg, Kenneth Yrke Jørgensen, Jir&iac...
INFORMATICALT
2002
72views more  INFORMATICALT 2002»
15 years 4 months ago
Simulation of Conflict in an Agent World: Access to Resources and Possibility of Termination of the Population
The goal of the paper is to create a model for investigating the character of relationships between the freedom and restrictions in the terrorism context, in order to find out how ...
Jaak Tepandi
SPIN
2005
Springer
15 years 10 months ago
Symbolic Model Checking for Asynchronous Boolean Programs
Abstract. Software model checking problems generally contain two different types of non-determinism: 1) non-deterministically chosen values; 2) the choice of interleaving among th...
Byron Cook, Daniel Kroening, Natasha Sharygina
WEBENG
2001
Springer
15 years 9 months ago
Development and Evolution of Web-Applications Using the WebComposition Process Model
From a software engineering perspective the World Wide Web is a new application platform. The implementation model that the Web is based on makes it difficult to apply classic proc...
Martin Gaedke, Guntram Gräf
ISSRE
2008
IEEE
15 years 11 months ago
Using Fault Modeling in Safety Cases
For many safety-critical systems a safety case is built as part of the certification or acceptance process. The safety case assembles evidence to justify that the design and imple...
Robyn R. Lutz, Ann Patterson-Hine