Computer and information sciences topic list of research papers
-
Vector Symmetry Reduction
Abstract Symmetry reduction is an effective state-space reduction technique for model checking, and works by restricting search to equivalence class representatives with respect to a group of symmetries for a model. A major problem with symmetry...
2009 / Alastair F. Donaldson -
Artifact Removal from Biosignal using Fixed Point ICA Algorithm for Pre-processing in Biometric Recognition2013 / Puneet Mishra, Sunil Kumar Singla
-
Modeling and Verifying Time Sensitive Security Protocols with Constraints
Abstract This paper researches the characteristic of time sensitive protocols and presents a method with simple operations to verify protocols with time stamps and avoid false attacks. Firstly, an extension of π calculus is given to model a time...
2008 / Ti Zhou, Mengjun Li, Zhoujun Li, Huowang Chen -
SAT-based Abstraction Refinement for Real-time Systems
Abstract In this paper, we present an abstraction refinement approach for model checking safety properties of real-time systems using SAT-solving. We present a faithful embedding of bounded model checking for systems of timed automata into...
2007 / Stephanie Kemper, André Platzer -
Soundly Handling Static Fields: Issues, Semantics and Analysis
Abstract Although in most cases class initialization works as expected, some static fields may be read before being initialized, despite being initialized in their corresponding class initializer. We propose an analysis which compute, for each...
2009 / Laurent Hubert, David Pichardie -
An Axiomatic Approach to Computing the Connectivity of Synchronous and Asynchronous Systems
Abstract We present a unified, axiomatic approach to proving lower bounds for the k-set agreement problem in both synchronous and asynchronous message-passing models. The proof involves constructing the set of reachable states, proving that these...
2009 / Maurice Herlihy, Sergio Rajsbaum, Mark Tuttle -
Instantaneous Transitions in Esterel
Abstract Esterel is an imperative synchronous programming language for the specification of deterministic concurrent reactive systems. While providing the usual control-flow constructs—sequences, loops, conditionals, and exceptions—its lack of a...
2008 / Olivier Tardieu, Stephen A. Edwards -
An Algebraic Baseline for Automatic Transformations in MDA
Abstract Software evolution can be supported at two levels: models and programs. The model-based software development approach allows the application of a more abstract process of software evolution, in accordance with the OMG's MDA initiative. We...
2005 / Artur Boronat, José Á. Carsí, Isidro Ramos -
Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions
Abstract In this paper we develop a framework, based on strand spaces, for reasoning about cryptographic protocols and characterizing their executions. We define skeletons, homomorphisms, and shapes. Skeletons model partial information about regular ...
2007 / Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer -
From Process Calculi to Klaim and Back
Abstract We briefly describe the motivations and the background behind the design of Klaim, a process description language that has proved to be suitable for describing a wide range of distributed applications with agents and code mobility. We argue ...
2006 / Rocco De Nicola -
Validation of Proofs Using PhoX
Abstract In this paper we present the DemoNat project, its purposes and the ideas developed so far. DemoNat is a French project whose aim is to make a program able to analyze and validate proofs made in a natural language. It will be used by...
2005 / Patrick Thévenon -
Timed Specification For Web Services Compatibility Analysis
Abstract Web services are becoming one of the main technologies for designing and building complex inter-enterprise business applications. Usually, a business application cannot be fulfilled by one Web service but by coordinating a set of them. In...
2008 / Nawal Guermouche, Olivier Perrin, Christophe Ringeissen -
Security of RFID Protocols – A Case Study
Abstract In the context of Dolev-Yao style analysis of security protocols, we investigate the security claims of a recently proposed RFID authentication protocol. We exhibit a flaw which has gone unnoticed in RFID protocol literature and present the ...
2009 / Ton van Deursen, Saša Radomirović -
Models of Rate Restricted Communication for Concurrent Objects
Abstract Many software systems today are designed for deployment on a range of architectures. However, in formal models it is typically assumed that the architecture is known and fixed; for example, that the software is sequential or concurrent,...
2011 / Rudolf Schlatte, Einar Broch Johnsen, Fatemeh Kazemeyni, S. Lizeth Tapia Tarifa -
Towards a Subject-Oriented Model-Driven Framework
Abstract Model-Driven Architecture is an approach which tackles such problems as: the high availability that a software product requires to be ready for use, the high degree of evolution that a software system has nowadays, etc. However, in the...
2006 / Pablo Amaya, Carlos Gonzalez, Juan M. Murillo -
Structural Operational Semantics with First-Order Logic
Abstract We define a formalism for Structural Operational Semantics (SOS) with first-order-logic formulas as premises. It is shown that in most uses (including all practical uses) this formalism has the same expressivity as SOS without first-order...
2009 / Muck van Weerdenburg, Michel A. Reniers -
Quadtrees as an Abstract Domain
Abstract Quadtrees have proved popular in computer graphics and spatial databases as a way of representing regions in two dimensional space. This hierarchical data-structure is flexible enough to support non-convex and even disconnected regions,...
2010 / Jacob M. Howe, Andy King, Charles Lawrence-Jones -
Verification of AMBA Using a Combination of Model Checking and Theorem Proving
Abstract The Advanced Microcontroller Bus Architecture (AMBA) is an open System-on-Chip bus protocol for high-performance buses on low-power devices. We demonstrate the combined use of model checking and theorem proving to verify both control and...
2006 / Hasan Amjad -
Monitoring External Resources in Java MIDP
Abstract We present a Java library for mobile phones which tracks and controls at runtime the use of potentially costly resources, such as premium rate text messages. This improves on the existing framework (MIDP — the Mobile Information Device...
2008 / David Aspinall, Patrick Maier, Ian Stark -
Weighted bipartite network and personalized recommendation
Abstract In this paper, the degree distributions of a bipartite network, namely Movielens, are investigated. The statistical analysis shows that the distribution of the degree product, ku ko, has an exponential from, where ku and ko denote the user...
2010 / Xin Pan, Guishi Deng, Jian-Guo Liu