Results 1 to 10 of about 233,881 (272)
Model-Checking Process Equivalences [PDF]
Process equivalences are formal methods that relate programs and system which, informally, behave in the same way. Since there is no unique notion of what it means for two dynamic systems to display the same behaviour there are a multitude of formal ...
Martin Lange +2 more
doaj +8 more sources
Probabilistic model checking of cancer metabolism [PDF]
Cancer cell metabolism is often deregulated as a result of adaption to meeting energy and biosynthesis demands of rapid growth or direct mutation of key metabolic enzymes.
Meir D. Friedenberg +4 more
doaj +2 more sources
Model-checking ecological state-transition graphs. [PDF]
Model-checking is a methodology developed in computer science to automatically assess the dynamics of discrete systems, by checking if a system modelled as a state-transition graph satisfies a dynamical property written as a temporal logic formula.
Colin Thomas +3 more
doaj +2 more sources
Fault Tolerance Framework for Composite Web Services
A composite Web service combines multiple, logically interrelated services for creating more common services meeting complex requirements from users. The services participating in a composition coordinate the actions of distributed activity using Web ...
Nimra Memon +3 more
doaj +1 more source
Synthesis of Fault-Tolerant Reliable Broadcast Algorithms With Reinforcement Learning
Fault-tolerant algorithms, such as Reliable Broadcast, assure the correct operation of modern distributed systems, even when some of the system nodes fail.
Diogo Vaz +3 more
doaj +1 more source
DICER 2.0: A New Model Checker for Data-Flow Errors of Concurrent Software Systems
Petri nets are widely used to model concurrent software systems. Currently, there are many different kinds of Petri net tools that can analyze system properties such as deadlocks, reachability and liveness. However, most tools are not suitable to analyze
Dongming Xiang, Fang Zhao, Yaping Liu
doaj +1 more source
Reduction Model Checking for Multi-Agent Systems of Group Social Commitments
Innumerable industries now use multi-agent systems (MASs) in various contexts, including healthcare, security, and commercial deployments. It is challenging to select reliable business protocols for critically important safety-related systems (e.g., in ...
Bader M. AlFawwaz +2 more
doaj +1 more source
Handling State Space Explosion in Component-Based Software Verification: A Review
Component-based software development (CBSD) is an alternative approach to constructing software systems that offers numerous benefits, particularly in decreasing the complexity of system design.
Faranak Nejati +3 more
doaj +1 more source
Turing Lecture from the winners of the 2007 ACM A.M. Turing Award. In 1981, Edmund M. Clarke and E. Allen Emerson, working in the USA, and Joseph Sifakis working independently in France, authored seminal papers that founded what has become the highly successful field of model checking.
DORON PELED +2 more
+5 more sources
A Security Analysis of Circuit Clock Obfuscation
Key-based circuit obfuscation or logic-locking is a technique that can be used to hide the full design of an integrated circuit from an untrusted foundry or end-user. The technique is based on creating ambiguity in the original circuit by inserting “key”
Rajesh Datta +3 more
doaj +1 more source

