FORTE C

22 papers

YearTitle / Authors
2008A Hierarchy of Equivalences for Probabilistic Processes.
Manuel Núñez, Luis Fernando Llana Díaz
2008A Specification Framework for Earth-Friendly Logistics.
Ichiro Satoh
2008Adapting Petri Nets Reductions to Promela Specifications.
Christophe Pajault, Jean-François Pradat-Peyre, Pierre Rousseau
2008An Experimental Evaluation of Probabilistic Simulation.
Jonathan Bogdoll, Holger Hermanns, Lijun Zhang
2008An SMT Approach to Bounded Reachability Analysis of Model Programs.
Margus Veanes, Nikolaj S. Bjørner, Alexander Raschke
2008Checking Correctness of Transactional Behaviors.
Vincenzo Ciancia, Gian-Luigi Ferrari, Roberto Guanciale, Daniele Strollo
2008Counterexample Guided Spotlight Abstraction Refinement.
Tobe Toben
2008Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning.
Guoqiang Shu, Yating Hsu, David Lee
2008Distributed Semantics and Implementation for Systems with Interaction and Priority.
Ananda Basu, Philippe Bidinger, Marius Bozga, Joseph Sifakis
2008Formal Techniques for Networked and Distributed Systems - FORTE 2008, 28th IFIP WG 6.1 International Conference, Tokyo, Japan, June 10-13, 2008, Proceedings
Kenji Suzuki, Teruo Higashino, Keiichi Yasumoto, Khaled El-Fakih
2008Model Generation for Horn Logic with Stratified Negation.
Ethan K. Jackson, Wolfram Schulte
2008Modelling and Analysing the Contract Net Protocol - Extension Using Coloured Petri Nets.
Jonathan Billington, Amar Kumar Gupta, Guy Edward Gallasch
2008Multiset Bisimulations as a Common Framework for Ordinary and Probabilistic Bisimulations.
David de Frutos-Escrig, Miguel Palomino, Ignacio Fábregas
2008NQSL - Formal Language and Tool Support for Network Quality-of-Service Requirements.
Christian Webel, Reinhard Gotzhein, Joachim Nicolay
2008Parameterized Tree Systems.
Parosh Aziz Abdulla, Noomene Ben Henda, Giorgio Delzanno, Frédéric Haziza, Ahmed Rezine
2008Program Repair Suggestions from Graphical State-Transition Specifications.
Farn Wang, Chih-Hong Cheng
2008Protocol Modeling with Model Program Composition.
Margus Veanes, Wolfram Schulte
2008Specifying and Verifying Web Transactions.
Jing Li, Huibiao Zhu, Jifeng He
2008Timed Mobile Ambients for Network Protocols.
Bogdan Aman, Gabriel Ciobanu
2008Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol.
Wei Wang, Dongyao Ji
2008Verification of a Hierarchical Generic Mutual Exclusion Algorithm.
Souheib Baarir, Julien Sopena, Fabrice Legond-Aubry
2008Verifying Erlang Telecommunication Systems with the Process Algebra µCRL.
Qiang Guo, John Derrick, Csaba Hoch