Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

58 results
Keywords : verification
Image document

U-Stroke Pattern Modeling for End User Identity Verification Through Ubiquitous Input Device

Tapalina Bhattasali , Nabendu Chaki , Khalid Saeed , Rituparna Chaki
14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.219-230, ⟨10.1007/978-3-319-24369-6_18⟩
Conference papers hal-01444467v1
Image document

Scan: A Simple Coordination Workbench

Jean-Marie Jacquet , Manel Barkallah
21th International Conference on Coordination Languages and Models (COORDINATION), Jun 2019, Kongens Lyngby, Denmark. pp.75-91, ⟨10.1007/978-3-030-22397-7_5⟩
Conference papers hal-02365497v1
Image document

Verbal Use Case Specifications for Informal Requirements Elicitation

Eliezer Kantorowitz
7th Workshop on Human-Computer Interaction and Visualization (HCIV), Aug 2011, Rostock, Germany. pp.165-174, ⟨10.1007/978-3-642-54894-9_12⟩
Conference papers hal-01414703v1
Image document

Validating SCTP Simultaneous Open Procedure

Somsak Vanit-Anunchai
5th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2013, Tehran, Iran. pp.233-249, ⟨10.1007/978-3-642-40213-5_15⟩
Conference papers hal-01514670v1
Image document

Modeling and Efficient Verification of Broadcasting Actors

Behnaz Yousefi , Fatemeh Ghassemi , Ramtin Khosravi
6th Fundamentals of Software Engineering (FSEN), Apr 2015, Tehran, Iran. pp.69-83, ⟨10.1007/978-3-319-24644-4_5⟩
Conference papers hal-01446611v1
Image document

Ubiquitous Verification of Ubiquitous Systems

Reinhard Wilhelm , Matteo Maffei
8th IFIP WG 10.2 International Workshop on Software Technologies for Embedded and Ubiquitous Systems (SEUS), Oct 2010, Waidhofen/Ybbs, Austria. pp.47-58, ⟨10.1007/978-3-642-16256-5_7⟩
Conference papers hal-01055377v1
Image document

Bounded Model Checking of Graph Transformation Systems via SMT Solving

Tobias Isenberg , Dominik Steenken , Heike Wehrheim
15th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOOODS) / 33th International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2013, Florence, Italy. pp.178-192, ⟨10.1007/978-3-642-38592-6_13⟩
Conference papers hal-01515236v1
Image document

Using Backward Induction Techniques in (Timed) Security Protocols Verification

Mirosław Kurkowski , Olga Siedlecka-Lamch , Paweł Dudek
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.265-276, ⟨10.1007/978-3-642-40925-7_25⟩
Conference papers hal-01496073v1
Image document

Efficient Operational Semantics for $ EB ^3$ for Verification of Temporal Properties

Dimitris Vekris , Catalin Dima
5th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2013, Tehran, Iran. pp.133-149, ⟨10.1007/978-3-642-40213-5_9⟩
Conference papers hal-01514655v1
Image document

On Implementing Symbolic Controllability

Adrian Francalanza , Jasmine Xuereb
22th International Conference on Coordination Languages and Models (COORDINATION), Jun 2020, Valletta, Malta. pp.350-369, ⟨10.1007/978-3-030-50029-0_22⟩
Conference papers hal-03273999v1
Image document

Verification of concurrent design patterns with data

Simon Bliudze , Ludovic Henrio , Eric Madelaine
COORDINATION 2019 - 21st International Conference on Coordination Models and Languages, Jun 2019, Kongens Lyngby, Denmark. pp.161-181, ⟨10.1007/978-3-030-22397-7_10⟩
Conference papers hal-02143782v1
Image document

A model checking based approach for detecting SDN races

Evgenii Vinarskii , Jorge Lopez , Natalia Kushik , Nina Yevtushenko , Djamal Zeghlache
ICTSS 2019: 31st IFIP International Conference on Testing Software and Systems, Oct 2019, Paris, France. pp.194-211, ⟨10.1007/978-3-030-31280-0_12⟩
Conference papers hal-02448964v1
Image document

A New Handwritten Signature Verification System Based on the Histogram of Templates Feature and the Joint Use of the Artificial Immune System with SVM

Yasmine Serdouk , Hassiba Nemmour , Youcef Chibani
6th IFIP International Conference on Computational Intelligence and Its Applications (CIIA), May 2018, Oran, Algeria. pp.119-127, ⟨10.1007/978-3-319-89743-1_11⟩
Conference papers hal-01913916v1
Image document

Translation Validation for Synchronous Data-Flow Specification in the SIGNAL Compiler

Van Chan Ngo , Jean-Pierre Talpin , Thierry Gautier
35th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2015, Grenoble, France. pp.66-80, ⟨10.1007/978-3-319-19195-9_5⟩
Conference papers hal-01767328v1
Image document

Purpose-Based Policy Enforcement in Actor-Based Systems

Shahrzad Riahi , Ramtin Khosravi , Fatemeh Ghassemi
7th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2017, Teheran, Iran. pp.196-211, ⟨10.1007/978-3-319-68972-2_13⟩
Conference papers hal-01760856v1
Image document

Formal Software Verification: How Close Are We?

Gerard J. Holzmann
Joint 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 30th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2010, Amsterdam, Netherlands. pp.1, ⟨10.1007/978-3-642-13464-7_1⟩
Conference papers hal-01055211v1
Image document

Formal Specification and Verification of CRDTs

Peter Zeller , Annette Bieniusa , Arnd Poetzsch-Heffter
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.33-48, ⟨10.1007/978-3-662-43613-4_3⟩
Conference papers hal-01398007v1
Image document

On a Verification Framework for Certifying Distributed Algorithms: Distributed Checking and Consistency

Kim Völlinger , Samira Akili
38th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2018, Madrid, Spain. pp.161-180, ⟨10.1007/978-3-319-92612-4_9⟩
Conference papers hal-01824815v1
Image document

Towards a Formally Verified EVM in Production Environment

Xiyue Zhang , Yi Li , Meng Sun
22th International Conference on Coordination Languages and Models (COORDINATION), Jun 2020, Valletta, Malta. pp.341-349, ⟨10.1007/978-3-030-50029-0_21⟩
Conference papers hal-03273991v1
Image document

Access Control and Query Verification for Untrusted Databases

Rohit Jain , Sunil Prabhakar
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.211-225, ⟨10.1007/978-3-642-39256-6_14⟩
Conference papers hal-01490706v1
Image document

Coordination of ECA Rules by Verification and Control

Julio Cano , Gwenaël Delaval , Eric Rutten
COORDINATION 2014 - 16th International Conference on Coordination Models and Languages, Jun 2014, Berlin, Germany. pp.33-48, ⟨10.1007/978-3-662-43376-8_3⟩
Conference papers hal-01290066v1
Image document

Formal Methods for Railway Disasters Prevention

Lilia Belabed , Tullio Tanzi , Sophie Coudert
2nd International Conference on Information Technology in Disaster Risk Reduction (ITDRR), Oct 2017, Sofia, Bulgaria. pp.161-176, ⟨10.1007/978-3-030-18293-9_14⟩
Conference papers hal-02280313v1
Image document

Separating Obligations of Subjects and Handlers for More Flexible Event Type Verification

José Sánchez , Gary T. Leavens
12th International Conference on Software Composition (SC), Jun 2013, Budapest, Hungary. pp.65-80, ⟨10.1007/978-3-642-39614-4_5⟩
Conference papers hal-01492777v1
Image document

From Event-B Models to Dafny Code Contracts

Mohammadsadegh Dalvandi , Michael Butler , Abdolbaghi Rezazadeh
6th Fundamentals of Software Engineering (FSEN), Apr 2015, Tehran, Iran. pp.308-315, ⟨10.1007/978-3-319-24644-4_21⟩
Conference papers hal-01446608v1
Image document

Effectiveness for Input Output Conformance Simulation iocos̱

Carlos Gregorio-Rodríguez , Luis Llana , Rafael Martínez-Torres
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.100-116, ⟨10.1007/978-3-662-43613-4_7⟩
Conference papers hal-01398009v1
Image document

Analyzing Computer Game Narratives

Clark Verbrugge , Peng Zhang
9th International Conference on Entertainment Computing (ICEC), Sep 2010, Seoul, South Korea. pp.224-231, ⟨10.1007/978-3-642-15399-0_21⟩
Conference papers hal-01055639v1
Image document

Expert Knowledge Based Design and Verification of Secure Systems with Embedded Devices

Vasily Desnitsky , Igor Kotenko
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.194-210, ⟨10.1007/978-3-319-10975-6_15⟩
Conference papers hal-01403995v1
Image document

Metrics for Differential Privacy in Concurrent Systems

Lili Xu , Konstantinos Chatzikokolakis , Huimin Lin
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.199-215, ⟨10.1007/978-3-662-43613-4_13⟩
Conference papers hal-00879140v2
Image document

Formal Verification of Virtual Network Function Graphs in an SP-DevOps Context

Serena Spinoso , Matteo Virgilio , Wolfgang John , Antonio Manzalini , Guido Marchetto , et al.
4th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2015, Taormina, Italy. pp.253-262, ⟨10.1007/978-3-319-24072-5_18⟩
Conference papers hal-01757560v1
Image document

Uniform Protection for Multi-exposed Targets

Roberto Vigo , Flemming Nielson , Hanne Riis Nielson
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.182-198, ⟨10.1007/978-3-662-43613-4_12⟩
Conference papers hal-01398016v1