Sciweavers

WADT
2004
Springer
14 years 1 months ago
Modelling Mobility with Petri Hypernets
Petri hypernets, a novel framework for modeling mobile agents based on nets-within-nets paradigm is presented. Hypernets employ a local and finitary character of interactions betw...
Marek A. Bednarczyk, Luca Bernardinello, Wieslaw P...
WADT
2004
Springer
14 years 1 months ago
Theoroidal Maps as Algebraic Simulations
Abstract. Computational systems are often represented by means of Kripke structures, and related using simulations. We propose rewriting logic as a flexible and executable framewo...
Narciso Martí-Oliet, José Meseguer, ...
WADT
2004
Springer
14 years 1 months ago
Ontologies for the Semantic Web in Casl
Abstract. This paper describes a sublanguage of Casl, called CaslDL, that corresponds to the Web Ontology Language (OWL) being used for the semantic web. OWL can thus benefit from...
Klaus Lüttich, Till Mossakowski, Bernd Krieg-...
VMCAI
2004
Springer
14 years 1 months ago
Boolean Algebra of Shape Analysis Constraints
Shape analysis is a promising technique for statically verifying and extracting properties of programs that manipulate complex data structures. We introduce a new characterization...
Viktor Kuncak, Martin C. Rinard
VMCAI
2004
Springer
14 years 1 months ago
Approximate Probabilistic Model Checking
In this paper we deal with the problem of applying model checking to real programs. We verify a program without constructing the whole transition system using a technique based on...
Thomas Hérault, Richard Lassaigne, Fr&eacut...
VMCAI
2004
Springer
14 years 1 months ago
A Grand Challenge for Computing: Towards Full Reactive Modeling of a Multi-cellular Animal
Biological systems can be modeled beneficially as reactive systems, using languages and tools developed for the construction of man-made systems. Our long-term aim is to model a f...
David Harel
VMCAI
2004
Springer
14 years 1 months ago
History-Dependent Scheduling for Cryptographic Processes
Abstract. This paper presents history-dependent scheduling, a new technique for reducing the search space in the verification of cryptographic protocols. This technique allows the...
Vincent Vanackère
VMCAI
2004
Springer
14 years 1 months ago
Security, Protocols, and Trust
Joshua D. Guttman
VMCAI
2004
Springer
14 years 1 months ago
Construction of a Semantic Model for a Typed Assembly Language
Typed Assembly Languages (TALs) can be used to validate the safety of assembly-language programs. However, typing rules are usually trusted as axioms. In this paper, we show how to...
Gang Tan, Andrew W. Appel, Kedar N. Swadi, Dinghao...