Verifying Communication Protocols Using Live Sequence Chart Specifications Fulltext Access 16 Pages 2009
Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol Fulltext Access 16 Pages 2009
Refinement Sensitive Formal Semantics of State Machines With Persistent Choice Fulltext Access 16 Pages 2009
A Semantic Condition for Data Independence and Applications in Hardware Verification Fulltext Access 16 Pages 2009
The Tractability of Model-checking for LTL: The Good, the Bad, and the Ugly Fragments Fulltext Access 16 Pages 2009
Completeness and Correspondence in Hybrid Logic via an Extension of SQEMA Fulltext Access 16 Pages 2009
Some specially formulated axiomizations for IΣ0 manage to evade the Herbrandized version of the Second Incompleteness Theorem Fulltext Access 16 Pages 2009
Reasoning in Abella about Structural Operational Semantics Specifications Fulltext Access 16 Pages 2009
Equational Abstractions for Reducing the State Space of Rewrite Theories Fulltext Access 16 Pages 2009
A Resource-Aware Semantics and Abstract Machine for a Functional Language with Explicit Deallocation Fulltext Access 16 Pages 2009
Using CLP Simplifications to Improve Java Bytecode Termination Analysis Fulltext Access 16 Pages 2009
Reconstruction of Partial Orders and List Representation as Random Structures Fulltext Access 16 Pages 2009
Definite Descriptions and Dijkstra's Odd Powers of Odd Integers Problem Fulltext Access 16 Pages 2009
Tool Support for Holistic Modelling of Distributed Embedded Systems in Creol Fulltext Access 16 Pages 2009
Cost Relation Systems: A Language-Independent Target Language for Cost Analysis Fulltext Access 16 Pages 2009
jSynoPSys – A Scenario-Based Testing Tool based on the Symbolic Animation of B Machines Fulltext Access 16 Pages 2009
Model-based Kernel Testing for Concurrency Bugs through Counter Example Replay Fulltext Access 16 Pages 2009
Improved Continuous Approximation of PEPA Models through Epidemiological Examples Fulltext Access 16 Pages 2009
Algorithms and Complexity of Automata Synthesis by Asynhcronous Orchestration With Applications to Web Services Composition Fulltext Access 16 Pages 2009
Operational Termination of Conditional Rewriting with Built-in Numbers and Semantic Data Structures Fulltext Access 16 Pages 2009
Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic Primitives Fulltext Access 16 Pages 2009
Adaptive Latency Insensitive Protocols and Elastic Circuits with Early Evaluation: A Comparative Analysis Fulltext Access 16 Pages 2009