Sciweavers

1601 search results - page 122 / 321
» The affordable application of formal methods to software eng...
Sort
View
SIGSOFT
2007
ACM
14 years 10 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
HYBRID
2005
Springer
14 years 2 months ago
Controller Synthesis on Non-uniform and Uncertain Discrete-Time Domains
Abstract. The problem of synthesizing feedback controllers that perform sensing and actuation actions on non–uniform and uncertain discrete time domains is considered. This class...
Andrea Balluchi, Pierpaolo Murrieri, Alberto L. Sa...
SEFM
2007
IEEE
14 years 3 months ago
Disciplining Orchestration and Conversation in Service-Oriented Computing
We give a formal account of a calculus for modeling service-based systems, suitable to describe both service composition (orchestration) and the protocol that services run when in...
Ivan Lanese, Francisco Martins, Vasco Thudichum Va...
FOSSACS
2006
Springer
14 years 27 days ago
Guessing Attacks and the Computational Soundness of Static Equivalence
The indistinguishability of two pieces of data (or two lists of pieces of data) can be represented formally in terms of a relation called static equivalence. Static equivalence dep...
Martín Abadi, Mathieu Baudet, Bogdan Warins...
TAPSOFT
1997
Springer
14 years 1 months ago
Traces of I/O-Automata in Isabelle/HOLCF
Abstract. This paper presents a formalization of nite and in nite sequences in domain theory carried out in the theorem prover Isabelle. The results are used to model the metatheor...
Olaf Müller, Tobias Nipkow