Nothing Special   »   [go: up one dir, main page]

skip to main content
Reflects downloads up to 12 Dec 2024Bibliometrics
Skip Table Of Content Section
research-article
Open Access
Relating trace refinement and linearizability
Abstract

In the late 1980’s, Back extended the notion of stepwise refinement of sequential systems to concurrent systems. By doing so he provided a definition of what it means for a concurrent system to be correct with respect to an abstract (potentially ...

research-article
Open Access
Concurrency-preserving and sound monitoring of multi-threaded component-based systems: theory, algorithms, implementation, and evaluation
Abstract

This paper addresses the monitoring of logic-independent linear-time user-provided properties in multi-threaded component-based systems. We consider intrinsically independent components that can be executed concurrently with a centralized ...

research-article
Open Access
A verification and deployment approach for elastic component-based applications
Abstract

Cloud environments are being increasingly used for the deployment and execution of complex applications and particularly component-based ones. They are expected to provide elasticity, among other characteristics, in order to allow a deployed ...

research-article
Open Access
Simulation relations for fault-tolerance
Abstract

We present a formal characterization of fault-tolerant behaviors of computing systems via simulation relations. This formalization makes use of variations of standard simulation relations in order to compare the executions of a system that ...

research-article
Open Access
Modeling and efficient verification of wireless ad hoc networks
Abstract

Wireless ad hoc networks, in particular mobile ad hoc networks (MANETs), are growing very fast as they make communication easier and more available. However, their protocols tend to be difficult to design due to topology dependent behavior of ...

research-article
Open Access
Dynamic intransitive noninterference revisited
Abstract

The paper studies dynamic information flow security policies in an automaton-based model. Two semantic interpretations of such policies are developed, both of which generalize the notion of TA-security [van der Meyden ESORICS 2007] for static ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.