Sciweavers

1516 search results - page 84 / 304
» Trends in Software Verification
Sort
View
ISSTA
2010
ACM
13 years 11 months ago
Analysis of invariants for efficient bounded verification
SAT-based bounded verification of annotated code consists of translating the code together with the annotations to a propositional formula, and analyzing the formula for specifica...
Juan P. Galeotti, Nicolás Rosner, Carlos L&...
SEKE
2010
Springer
13 years 7 months ago
A Multi-State Bayesian Network for Shill Verification in Online Auctions
Online auction systems have made remarkable progress in recent years. However, one of the most severe and persistent problems in such systems is shilling behavior, which is a type ...
Ankit Goel, Haiping Xu, Sol M. Shatz
COMPSAC
2008
IEEE
14 years 3 months ago
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats
This work introduces probabilistic model checking as a viable tool-assisted approach for systematically quantifying DoS security threats. The proposed analysis is based on a proba...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
KBSE
2008
IEEE
14 years 3 months ago
Swarm Verification
Reportedly, supercomputer designer Seymour Cray once said that he would sooner use two strong oxen to plow a field than a thousand chickens. Although this is undoubtedly wise when...
Gerard J. Holzmann, Rajeev Joshi, Alex Groce
ESEC
1997
Springer
14 years 1 months ago
Verification of Liveness Properties Using Compositional Reachability Analysis
The software architecture of a distributed program can be represented by a hierarchical composition of subsystems, with interacting processes at the leaves of the hierarchy. Compo...
Shing-Chi Cheung, Dimitra Giannakopoulou, Jeff Kra...