Filters








10,629 Hits in 5.3 sec

Guest Editors' Introduction: 2003 International Conference on Software Engineering

L.K. Dillon, W.F. Tichy
2004 IEEE Transactions on Software Engineering  
E-mail: tichy@ira.uka.de.For information on obtaining reprints of this article, please send e-mail to: tse@computer.org.  ...  Finally, the paper "Modular Verification of Software Components in C" by S. Chaki, E. Clarke, A. Groce, S. Jha, and H. Veith describes a compositional methodology for verifying C programs.  ... 
doi:10.1109/tse.2004.21 fatcat:h3nnvezolnej5kzenylzdc3zca

A Refinement based Verification Approach of BPMN Models using NuSMV

Salma Ayari, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed
2018 Proceedings of the 13th International Conference on Software Technologies  
A Refinement based Verification Approach of BPMN Models using NuSMV.  ...  We introduce refinement patterns allowing the design of a complex application at different abstract level.  ...  that are present in the source models. 1. λ = size(Comp Email ′ )/size(Comp Email) = 4/1 = 4. 2. φ = sem(comp E mail ′ )/sem(comp E mail) = 10/2 = 5. 3. φ/λ = 5/4 = 1.25 ≈ 1 ⇒ Comp Email ′ ≈ Comp Email  ... 
doi:10.5220/0006914105630574 dblp:conf/icsoft/AyariHA18 fatcat:px7b4zev6zf3zgqjukahyiwcq4

Formal verification of a pervasive messaging system

Savas Konur, Michael Fisher, Simon Dobson, Stephen Knox
2013 Formal Aspects of Computing  
We also draw some tentative conclusions concerning the use of formal verification for pervasive computing in general.  ...  While formal verification is often used in safety analysis, it has rarely been used in the analysis of deployed pervasive applications.  ...  Stephen Knox was supported by Enterprise Ireland under the grant "Towards a Semantics of Pervasive Computing".  ... 
doi:10.1007/s00165-013-0277-4 fatcat:mswmzvyhardgdkgggj3syl7ogy

Quantitative analysis of a certified e-mail protocol in mobile environments: A probabilistic model checking approach

S. Basagiannis, S. Petridou, N. Alexiou, G. Papadimitriou, P. Katsaros
2011 Computers & security  
Given the popularity of e-mail service and the current trend for secure communications, analyzing the cost of security in e-mail service is an important issue.  ...  An abstract representation of the proposed analysis is presented in Fig. 1 .  ...  In [14] the authors propose such a protocol, namely the Fair Certified E-mail Delivery (CEMD).  ... 
doi:10.1016/j.cose.2011.02.001 fatcat:oe72mmq4svhr5c4qzjii5s4exm

SFB/TR 14 AVACS – Automatic Verification and Analysis of Complex Systems (Der Sonderforschungsbereich/Transregio 14 AVACS – Automatische Verifikation und Analyse komplexer Systeme)

Bernd Becker, Andreas Podelski, Werner Damm, Martin Fränzle, Ernst-Rüdiger Olderog, Reinhard Wilhelm
2007 it - Information Technology  
The Transregional Collaborative Research Center AVACS integrates the three sites Freiburg, Oldenburg, and Saarbrücken, and addresses the challenge of pushing the borderline for automatic verification and  ...  analysis of complex systems.  ...  run in parallel.  ... 
doi:10.1524/itit.2007.49.2.118 fatcat:2mb2uwdoazcirmt7ghfq3p7aua

Announcements of conferences

1994 Journal of Computational and Applied Mathematics  
To facilitate rapid communication, authors should provide a fax number and e-mail address if possible.  ...  telex, fax, e-mail) of the authors responsible for further correspondence with the organizers. l The submittted papers will be reviewed by the Program Committee.  ...  Authors will have approximately 15 minutes for the lecture, with additional 5 minutes for discussion.  ... 
doi:10.1016/0377-0427(94)90341-7 fatcat:2gitemrf6nfanmufvqbhhuqxoa

Conferences

1994 Journal of Computational and Applied Mathematics  
They must be singly authored and no more than 10 pages in length. Sending only an abstract is unacceptable. A panel of judges will determine the best papers.  ...  If available, include telephone and Fax numbers, as well as e-mail addresses. Notification of acceptance and authors' kits will be distributed by January 20, 1995.  ...  In parallel there will be presentations of software on numerical analysis and applications and a meeting (round table) with representatives of industrial circles.  ... 
doi:10.1016/0377-0427(94)90371-9 fatcat:jtgiypmcebaifiddplkdmucdg4

Abstract state machines and high-level system design and analysis

Egon Börger
2005 Theoretical Computer Science  
The background and the themes of this ASM-centered special issue of TCS are briefly described.  ...  Without their constructive criticism this issue of TCS would not be what it is.  ...  Acknowledgements I gratefully acknowledge the generous and decisive help of the numerous reviewers who have to remain anonymous.  ... 
doi:10.1016/j.tcs.2004.11.006 fatcat:6hpxsujmord5hntihde7apnliu

Page 2360 of Mathematical Reviews Vol. , Issue 81F [page]

1981 Mathematical Reviews  
Owicki, Specification and verification of a network mail system (pp. 198-234). III. Program development by transformation: F. L.  ...  Only correct programs can be verified, however. Analytic verification techniques have been developed recently into a method of joint construction of program and proof.  ... 

Comments on "Design and analysis of a totally decoupled 3-DOF spherical parallel manipulator" by D. Zhang and F. Zhang (Robotica, Available on CJO 19 Nov, 2010, doi:10.1017/S0263574710000652)

Xianwen Kong, Clément Gosselin, Marco Carricato
2011 Robotica (Cambridge. Print)  
[1] ); (e) the manipulator is not singularity-free (see Abstract, Introduction, and Conclusions in ref. [1] ).  ...  This topic is of great interest to researchers working in the general area of parallel mechanisms. However, we disagree with the authors of ref. [1] on their conclusion.  ... 
doi:10.1017/s0263574711000610 fatcat:fatmhgxotbflvo7xa6vra5oqma

A parallel multiphase flow code for the 3D simulation of explosive volcanic eruptions

T. Esposti Ongaro, C. Cavazzoni, G. Erbacci, A. Neri, M.V. Salvetti
2007 Parallel Computing  
Parallel Computing features original research work, tutorial and review articles as well as novel or illustrative accounts of application experience with (and techniques for) the use of parallel computers  ...  Parallel I/O systems both hardware and software Networking technology for support of high-speed computing demonstrating the impact of high-speed computation on parallel applications Please note, we generally  ...  will be provided in the e-mail so that authors can download the files themselves.  ... 
doi:10.1016/j.parco.2007.04.003 fatcat:qz4vwrmt4za5xohyocjpxbt2n4

Fixed latency on-chip interconnect for hardware spiking neural network architectures

Sandeep Pande, Fearghal Morgan, Gerard Smit, Tom Bruintjes, Jochem Rutgers, Brian McGinley, Seamus Cawley, Jim Harkin, Liam McDaid
2013 Parallel Computing  
Parallel Computing features original research work, tutorial and review articles as well as novel or illustrative accounts of application experience with (and techniques for) the use of parallel computers  ...  Parallel I/O systems both hardware and software Networking technology for support of high-speed computing demonstrating the impact of high-speed computation on parallel applications Please note, we generally  ...  will be provided in the e-mail so that authors can download the files themselves.  ... 
doi:10.1016/j.parco.2013.04.010 fatcat:hi2smnf2mnbujgmc4glgu33yiq

MSC volume 6 issue 3 Cover and Back matter

1996 Mathematical Structures in Computer Science  
In case of difficulties obtaining these files, there is a help-line available via e-mail; please contact texline@cup.cam.ac.uk.  ...  Cambridge International Series in Parallel Computation 7 Mathematical Theory of Domains V. STOLTENBERG-HANSEN, I. LINDSTROM and E. R.  ... 
doi:10.1017/s0960129500000979 fatcat:exgmqyueengo7dfsvxs63q3iee

Towards a Protocol Algebra Based on Algebraic Specifications [chapter]

Iakovos Ouranos, Petros Stefaneas
2014 Studies in Computational Intelligence  
This abstract approach allows defining several useful operators for protocol reasoning and proving properties of them using theorem proving techniques and CafeOBJ term rewriting machine.  ...  We sketch some first steps towards the definition of a protocol algebra based on the framework of behavioural algebraic specification.  ...  In this paper we propose the behavioral Iakovos Ouranos Hellenic Civil Aviation Authority, Heraklion Airport, Greece e-mail: iouranos@central.ntua.gr Petros Stefaneas National Technical University of  ... 
doi:10.1007/978-3-319-00948-3_6 fatcat:2xwcxryhlncxpcqeosievtnxu4

AIE volume 10 issue 2 Cover and Back matter

1996 Artificial intelligence for engineering design, analysis and manufacturing  
Shows how a theory of functional programming can be smoothly extended to admit both an operational semantics for functional I/O and verification of programs engaged in I/O.  ...  This page should include (a) the article's full title, (b) names and affiliations of all authors, (c) the name, mailing address, and telephone number of the corresponding author, (d) the address for reprint  ...  The Foundations of Parallel Computing David Skillicorn Provides an accessible account of the latest techniques used to design architecture independent parallel software.  ... 
doi:10.1017/s0890060400001311 fatcat:lyd4ujfulvex7etzmuvs3bhpbi
« Previous Showing results 1 — 15 out of 10,629 results