Sciweavers

ENTCS
2007
87views more  ENTCS 2007»
13 years 10 months ago
Temporal Logics of Knowledge and their Applications in Security
Temporal logics of knowledge are useful for reasoning about situations where the knowledge of an agent or component is important, and where change in this knowledge may occur over...
Clare Dixon, M. Carmen Fernández Gago, Mich...
ENTCS
2007
101views more  ENTCS 2007»
13 years 10 months ago
Compressing Propositional Refutations
We report initial results on shortening propositional resolution refutation proofs. This has an application in speeding up deductive reconstruction (in theorem provers) of large p...
Hasan Amjad
ENTCS
2007
99views more  ENTCS 2007»
13 years 10 months ago
Extending Symmetry Reduction Techniques to a Realistic Model of Computation
Much of the literature on symmetry reductions for model checking assumes a simple model of computation where the local state of each component in a concurrent system can be repres...
Alastair F. Donaldson, Alice Miller
ENTCS
2007
121views more  ENTCS 2007»
13 years 10 months ago
Incremental Parametric Development of Greedy Algorithms
The event B method provides a general framework for modelling both data structures and algorithms. B models are validated by discharging proof obligations ensuring safety properti...
Dominique Cansell, Dominique Méry
ENTCS
2007
98views more  ENTCS 2007»
13 years 10 months ago
Evaluating Complex MAC Protocols for Sensor Networks with APMC
In this paper we present an analysis of a MAC (Medium Access Control) protocol for wireless sensor networks. The purpose of this protocol is to manage wireless media access by con...
Michaël Cadilhac, Thomas Hérault, Rich...
ENTCS
2007
85views more  ENTCS 2007»
13 years 10 months ago
The GTO Toolset and Method
Lars-Henrik Eriksson
ENTCS
2007
143views more  ENTCS 2007»
13 years 10 months ago
Formal Fault Tree Analysis - Practical Experiences
Safety is an important requirement for many modern systems. To ensure safety of complex critical systems, well-known safety analysis methods have been formalized. This holds in pa...
Frank Ortmeier, Gerhard Schellhorn
ENTCS
2007
85views more  ENTCS 2007»
13 years 10 months ago
Automatic Verification of Bossa Scheduler Properties
Jean-Paul Bodeveix, Mamoun Filali, Julia L. Lawall...
ENTCS
2007
113views more  ENTCS 2007»
13 years 10 months ago
On the Decidability of the Safety Problem for Access Control Policies
An access control system regulates the rights of users to gain access to resources in accordance with a specified policy. The rules in this policy may interact in a way that is n...
E. Kleiner, T. Newcomb
ENTCS
2007
73views more  ENTCS 2007»
13 years 10 months ago
Language-Oriented Formal Analysis: a Case Study on Protocols and Distributed Systems
Carlos Bazílio, Edward Hermann Haeusler, Ma...