Results 61 to 70 of about 3,649,820 (385)
Formal verification of a deadlock detection algorithm [PDF]
Deadlock detection is a challenging issue in the analysis and design of on-chip networks. We have designed an algorithm to detect deadlocks automatically in on-chip networks with wormhole switching.
Freek Verbeek, Julien Schmaltz
doaj +1 more source
Formal specification and verification [PDF]
Beyond his seminal contributions to the theory and the design of concurrent and distributed algorithms, Leslie Lamport has throughout his career worked on methods and formalisms for rigorously establishing the correctness of algorithms.
openaire +3 more sources
Formal Verification of Security Protocol Implementations: A Survey [PDF]
Automated formal verification of security protocols has been mostly focused on analyzing high-level abstract models which, however, are significantly different from real protocol implementations written in programming languages.
A Bauer +27 more
core +2 more sources
Formal Verification of Code Conversion: A Comprehensive Survey
Code conversion, encompassing translation, optimization, and generation, is becoming increasingly critical in information systems and the software industry.
Amira T. Mahmoud +7 more
doaj +1 more source
Combinatorial Abstractions of Dynamical Systems [PDF]
Formal verification has been successfully developed in computer science for verifying combinatorial classes of models and specifications. In like manner, formal verification methods have been developed for dynamical systems.
Rafael Wisniewski
doaj +1 more source
rTLS: Secure and Efficient TLS Session Resumption for the Internet of Things
In recent years, the Transport Layer Security (TLS) protocol has enjoyed rapid growth as a security protocol for the Internet of Things (IoT). In its newest iteration, TLS 1.3, the Internet Engineering Task Force (IETF) has standardized a zero round-trip
Koen Tange +4 more
doaj +1 more source
Formal Model Engineering for Embedded Systems Using Real-Time Maude
This paper motivates why Real-Time Maude should be well suited to provide a formal semantics and formal analysis capabilities to modeling languages for embedded systems.
A. Boronat +27 more
core +2 more sources
Formal analysis techniques for gossiping protocols [PDF]
We give a survey of formal verification techniques that can be used to corroborate existing experimental results for gossiping protocols in a rigorous manner.
Bakhshi, Rena +3 more
core +5 more sources
Verifications of a formal technique for viscoelastodynamics [PDF]
Presented in this paper are justifications for the formal Karal-Keller technique as it applies to propagation, reflection, and transmission of one-dimensional impact waves in nonhomogeneous viscoelastic solids.
T. Bryant Moodie, D. W. Barclay
openaire +2 more sources
RAD50 missense variants differentially affect the DNA damage response and mitotic progression
RAD50 incorporates into the MRN complex and initiates the DNA damage response. Furthermore, RAD50 promotes mitotic progression. RAD50 missense variants capable of forming an MRN complex supported the DNA damage response and mitotic features to different extents in complementation experiments, indicating these functions are separable and might impact ...
Hanna Redeker +9 more
wiley +1 more source

