• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 487
Next 10 →

Table 5 Memory requirements for the protocol of the dining cryptographers.

in Automatic verification of multi-agent systems by model checking via ordered binary decision diagrams
by Franco Raimondi, Alessio Lomuscio

T able 1. The dining cryptographer protocol speci fi ed in pi -calculus.

in Motivations
by Catuscia Palamidessi 2007

Table 2. Example of translation from Promela into IL language.

in Towards Promela verification using VerICS
by Pawel Janowski, et al.
"... In PAGE 8: ...ig. 1. Nested IF construction example. Table2 does not contain never claim which (for sake of clarity) is presented in table 3. This never claim expresses the correctness of the Dining Cryptographers protocol.... ..."

Table 2. Dining

in Formal analysis of java programs in javafan
by Azadeh Farzan, Feng Chen, José Meseguer 2004
"... In PAGE 4: ...Currently, JavaFAN can detect the deadlock for up to 8 philosophers at the bytecode level and up to 9 philosophers at the Java Lanugage level in a reason- able amount of time ( Table2 ). It can also prove the program deadlock-free for up to 7 philosophers at both levels.... ..."
Cited by 14

Table 2. Dining

in Formal analysis of java programs in javafan
by Azadeh Farzan, Feng Chen, José Meseguer 2004
"... In PAGE 4: ...Currently, JavaFAN can detect the deadlock for up to 8 philosophers at the bytecode level and up to 9 philosophers at the Java Language level in a reason- able amount of time ( Table2 ). It can also prove the program deadlock-free for up to 7 philosophers at both levels.... ..."
Cited by 14

Table is in dining room

in Prospects for in-Depth Story Understanding By Computer
by Erik T. Mueller 1999
Cited by 8

Table 2. Dining

in Formal JVM code analysis in JavaFAN
by Azadeh Farzan, José Meseguer, Grigore Rosu 2004
"... In PAGE 13: ... The sequence shows a situation in which each philosopher has ac- quired one fork and is waiting for the other fork. Currently, we can detect the deadlock for up to 9 philosophers ( Table2 ). We also model checked a slightly modified version of the same program which avoids deadlock.... ..."
Cited by 4

Table 3: The dining philosophers

in Phase Semantics and Verification of Concurrent Constraint Programs
by François Fages, Paul Ruet, Sylvain Soliman

Table 3: The dining philosophers

in Phase Semantics and Verification of Concurrent Constraint Programs
by François Fages, Paul Ruet, Sylvain Soliman

Table 1: Dining philosophers

in Modeling and Validation of Java Multithreading Applications Using Spin
by C. Demartini, et al.
"... In PAGE 12: ... In order to eat, a philosopher executes two nested synchronized statements, the outer one on his left fork and the inner one on his right fork. Table1 shows the results obtained byhaving 3, 4, 5, 6 philosophers acting concurrently in a non-deadlocking manner (i.e.... ..."
Next 10 →
Results 1 - 10 of 487
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University