Sciweavers

533 search results - page 83 / 107
» Verification of Distributed Firewalls
Sort
View
ICSE
2010
IEEE-ACM
13 years 11 months ago
Efficient hybrid typestate analysis by determining continuation-equivalent states
Typestate analysis determines whether a program violates a set of finite-state properties. Because the typestate-analysis problem is statically undecidable, researchers have propo...
Eric Bodden
ATAL
2010
Springer
13 years 11 months ago
Using graph analysis to study networks of adaptive agent
Experimental analysis of networks of cooperative learning agents (to verify certain properties such as the system's stability) has been commonly used due to the complexity of...
Sherief Abdallah
LCTRTS
2010
Springer
13 years 7 months ago
Translating concurrent action oriented specifications to synchronous guarded actions
Concurrent Action-Oriented Specifications (CAOS) model the behavior of a synchronous hardware circuit as asynchronous guarded at an abstraction level higher than the Register Tran...
Jens Brandt, Klaus Schneider, Sandeep K. Shukla
SIGSOFT
2010
ACM
13 years 7 months ago
Representation dependence testing using program inversion
The definition of a data structure may permit many different concrete representations of the same logical content. A (client) program that accepts such a data structure as input i...
Aditya Kanade, Rajeev Alur, Sriram K. Rajamani, Ga...
ICPR
2004
IEEE
14 years 11 months ago
Discriminatory Power of Handwritten Words for Writer Recognition
Analysis of allographs (characters) and allograph combinations (words) is the key for the identification/verification of a writer's handwriting. While allographs are usually ...
Bin Zhang, Catalin I. Tomai, Sargur N. Srihari