Results 61 to 70 of about 3,649,820 (385)

Formal verification of a deadlock detection algorithm [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2011
Deadlock detection is a challenging issue in the analysis and design of on-chip networks. We have designed an algorithm to detect deadlocks automatically in on-chip networks with wormhole switching.
Freek Verbeek, Julien Schmaltz
doaj   +1 more source

Formal specification and verification [PDF]

open access: yes, 2019
Beyond his seminal contributions to the theory and the design of concurrent and distributed algorithms, Leslie Lamport has throughout his career worked on methods and formalisms for rigorously establishing the correctness of algorithms.
openaire   +3 more sources

Formal Verification of Security Protocol Implementations: A Survey [PDF]

open access: yes, 2014
Automated formal verification of security protocols has been mostly focused on analyzing high-level abstract models which, however, are significantly different from real protocol implementations written in programming languages.
A Bauer   +27 more
core   +2 more sources

Formal Verification of Code Conversion: A Comprehensive Survey

open access: yesTechnologies
Code conversion, encompassing translation, optimization, and generation, is becoming increasingly critical in information systems and the software industry.
Amira T. Mahmoud   +7 more
doaj   +1 more source

Combinatorial Abstractions of Dynamical Systems [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2013
Formal verification has been successfully developed in computer science for verifying combinatorial classes of models and specifications. In like manner, formal verification methods have been developed for dynamical systems.
Rafael Wisniewski
doaj   +1 more source

rTLS: Secure and Efficient TLS Session Resumption for the Internet of Things

open access: yesSensors, 2021
In recent years, the Transport Layer Security (TLS) protocol has enjoyed rapid growth as a security protocol for the Internet of Things (IoT). In its newest iteration, TLS 1.3, the Internet Engineering Task Force (IETF) has standardized a zero round-trip
Koen Tange   +4 more
doaj   +1 more source

Formal Model Engineering for Embedded Systems Using Real-Time Maude

open access: yes, 2011
This paper motivates why Real-Time Maude should be well suited to provide a formal semantics and formal analysis capabilities to modeling languages for embedded systems.
A. Boronat   +27 more
core   +2 more sources

Formal analysis techniques for gossiping protocols [PDF]

open access: yes, 2007
We give a survey of formal verification techniques that can be used to corroborate existing experimental results for gossiping protocols in a rigorous manner.
Bakhshi, Rena   +3 more
core   +5 more sources

Verifications of a formal technique for viscoelastodynamics [PDF]

open access: yesBulletin of the Australian Mathematical Society, 1974
Presented in this paper are justifications for the formal Karal-Keller technique as it applies to propagation, reflection, and transmission of one-dimensional impact waves in nonhomogeneous viscoelastic solids.
T. Bryant Moodie, D. W. Barclay
openaire   +2 more sources

RAD50 missense variants differentially affect the DNA damage response and mitotic progression

open access: yesFEBS Letters, EarlyView.
RAD50 incorporates into the MRN complex and initiates the DNA damage response. Furthermore, RAD50 promotes mitotic progression. RAD50 missense variants capable of forming an MRN complex supported the DNA damage response and mitotic features to different extents in complementation experiments, indicating these functions are separable and might impact ...
Hanna Redeker   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy