Sciweavers

ISARCS
2010
141views Hardware» more  ISARCS 2010»
14 years 21 days ago
Integrating Fault-Tolerant Techniques into the Design of Critical Systems
Abstract. Software designs equipped with specification of dependability techniques can help engineers to develop critical systems. In this work, we start to envision how a softwar...
Ricardo J. Rodríguez, José Merseguer
ISARCS
2010
188views Hardware» more  ISARCS 2010»
14 years 21 days ago
Component Behavior Synthesis for Critical Systems,
Abstract. Component-based architectures are widely used in embedded systems. For managing complexity and improving quality separation of concerns is one of the most important princ...
Tobias Eckardt, Stefan Henkler
CAV
2009
Springer
123views Hardware» more  CAV 2009»
14 years 21 days ago
On Using Floating-Point Computations to Help an Exact Linear Arithmetic Decision Procedure
We consider the decision problem for quantifier-free formulas whose atoms are linear inequalities interpreted over the reals or rationals. This problem may be decided using satisf...
David Monniaux
CAV
2009
Springer
165views Hardware» more  CAV 2009»
14 years 21 days ago
Equivalence Checking of Static Affine Programs Using Widening to Handle Recurrences
Designers often apply manual or semi-automatic loop and data transformations on array and loop intensive programs to improve performance. The transformations should preserve the fu...
Sven Verdoolaege, Gerda Janssens, Maurice Bruynoog...
CAV
2009
Springer
239views Hardware» more  CAV 2009»
14 years 21 days ago
MCMAS: A Model Checker for the Verification of Multi-Agent Systems
tic modalities for correctness [16]. The release described in this abstract is a complete rebuild of a preliminary experimental checker [14]. The model input language includes vari...
Alessio Lomuscio, Hongyang Qu, Franco Raimondi
ATVA
2007
Springer
150views Hardware» more  ATVA 2007»
14 years 21 days ago
3-Valued Circuit SAT for STE with Automatic Refinement
Abstract. Symbolic Trajectory Evaluation (STE) is a powerful technique for hardware model checking. It is based on a 3-valued symbolic simulation, using 0,1 and X n"), where t...
Orna Grumberg, Assaf Schuster, Avi Yadgar
ATVA
2007
Springer
103views Hardware» more  ATVA 2007»
14 years 21 days ago
Mind the Shapes: Abstraction Refinement Via Topology Invariants
Jörg Bauer, Tobe Toben, Bernd Westphal
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
14 years 21 days ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim
ATVA
2007
Springer
98views Hardware» more  ATVA 2007»
14 years 21 days ago
Model Checking Bounded Prioritized Time Petri Nets
Bernard Berthomieu, Florent Peres, François...