• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 26
Next 10 →

An Approach to Verification and Validation of a Reliable Multicasting Protocol

by John Callahan, Todd L. Montgomery - in Proceedings of the International Symposium on Software Testing and Analysis , 1996
"... : This paper describes the process of implementing a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally using a combinati ..."
Abstract - Cited by 17 (14 self) - Add to MetaCart
combination of formal and informal techniques in an attempt to ensure the correctness of its implementation. Our development process involved three concurrent activities: (1) the initial construction and incremental enhancement of a formal state model of the protocol machine; (2) the initial coding

An Approach to Verification and Validation of a Reliable Multicasting Protocol

by John Callahan And, John R. Callahan, Todd L. Montgomery - in Proceedings of the International Symposium on Software Testing and Analysis , 1996
"... : This paper describes the process of implementing a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally using a combinati ..."
Abstract - Add to MetaCart
combination of formal and informal techniques in an attempt to ensure the correctness of its implementation. Our development process involved three concurrent activities: (1) the initial construction and incremental enhancement of a formal state model of the protocol machine; (2) the initial coding

An Approach to Verification and Validation of a Reliable Multicasting Protocol

by Nasa/wvu Software Iv, V Facility, John R. Cauahan, Todd L. Montgomery, John R. Cauahan, Todd L. Montgomery
"... Abstract: This paper describes the process of implementing a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. Tile protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally using a ..."
Abstract - Add to MetaCart
combination of formal and informal techniques in an attempt to ensure the correctness of its implementation. Our development process involved three concun'ent activities: (1) the initial construction and incremental enhancement of a formal state model of the protocol machine; (2) tile initial coding

Guidelines for Formal Domain Modeling in Event-B

by Atif Mashkoor, Jean-pierre Jacquot , 2011
"... In this paper, we explore the possibility to use Event-B as a formal domain modeling tool. We identify the areas where domain modelers can struggle and present some guidelines to avoid these pitfalls. We mainly address three questions about domain modeling: what to specify, how to refine, and how t ..."
Abstract - Add to MetaCart
In this paper, we explore the possibility to use Event-B as a formal domain modeling tool. We identify the areas where domain modelers can struggle and present some guidelines to avoid these pitfalls. We mainly address three questions about domain modeling: what to specify, how to refine, and how

Modular Description and Verification of Concurrent Objects

by unknown authors
"... Abstract. The design of large and complex distributed systems requires a modular approach to support reuse and verification. We propose an object-oriented programming model based on concurrently executing communicating agents (concurrent objects) and an associated proof methodology that exploits the ..."
Abstract - Add to MetaCart
the class hierarchy to allow for modular verification. We propose to separate protocol from functionality in class definitions, and advocate separate hierarchies of protocol classes as a way to overcome the inheritance anomaly of concurrent object-oriented programming. We formalize an agent in Lamport

Verification of Chip Multiprocessor Memory Systems Using A Relaxed Scoreboard

by Ofer Shacham, Megan Wachs, Alex Solomatnikov, Amin Firoozshahian, Stephen Richardson, Mark Horowitz
"... Verification of chip multiprocessor memory systems remains challenging. While formal methods have been used to validate protocols, simulation is still the dominant method used to validate memory system implementation. Having a memory scoreboard, a high-level model of the memory, greatly aids simulat ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Verification of chip multiprocessor memory systems remains challenging. While formal methods have been used to validate protocols, simulation is still the dominant method used to validate memory system implementation. Having a memory scoreboard, a high-level model of the memory, greatly aids

Heuristics for Hierarchical Partitioning with Application to Model Checking

by M. Oliver Möller, Rajeev Alur - Department of Computer Science, University of Aarhus , 2000
"... . Given a collection of connected components, it is often desired to cluster together parts of strong correspondence, yielding a hierarchical structure. We address the automation of this process and apply heuristics to battle the combinatorial and computational complexity. We define a cost function ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
heuristic function. We argue for a heuristic function based on four criteria: the number of enclosed connections, the number of components, the number of touched connections and the depth of the structure. We report on an application in the context of formal verification, where our algorithm serves as a

Proactive Leader Election in Asynchronous Shared Memory Systems

by M C Dharmadeep, K Gopinath
"... Abstract. In this paper, we give an algorithm for fault-tolerant proactive leader election in asynchronous shared memory systems, and later its formal verification. Roughly speaking, a leader election algorithm is proactive if it can tolerate failure of nodes even after a leader is elected, and (sta ..."
Abstract - Add to MetaCart
Abstract. In this paper, we give an algorithm for fault-tolerant proactive leader election in asynchronous shared memory systems, and later its formal verification. Roughly speaking, a leader election algorithm is proactive if it can tolerate failure of nodes even after a leader is elected

To cite this version:

by Patrice Abry, Richard Baraniuk, Patrick Fl, Rudolf Riedi, Darryl Veitch, Patrice Abry, Richard Baraniuk, Patrick Fl, Rudolf Riedi, Darryl Veitch Wavelet, Patrice Abry, Richard Baraniuk, Patrick Fl, Rudolf Riedi, Darryl Veitch , 2007
"... HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci-entific research documents, whether they are pub-lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte p ..."
Abstract - Add to MetaCart
HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci-entific research documents, whether they are pub-lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et a ̀ la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.

Saskatoon By

by Dmytro Dyachuk
"... In presenting this thesis in partial fulfilment of the requirements for a Postgraduate degree ..."
Abstract - Add to MetaCart
In presenting this thesis in partial fulfilment of the requirements for a Postgraduate degree
Next 10 →
Results 1 - 10 of 26
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University