• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 90
Next 10 →

Push-button tools for application developers, Full formal verification for component vendors

by Thomas Wilson, Savi Maharaj, Robert G. Clark, Thomas Wilson, Savi Maharaj, Robert G. Clark
"... Software developers have varying abilities and develop software with differing reliability requirements. Sometimes reliability is critical and the developers have the mathematical capabilities to perform interactive theorem proving but this is not usually the case. We believe that most software deve ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
developers need easy to use tools such as run-time assertion checkers and extended static checkers that can help them produce more reliable application-specific code cheaply. However, these lightweight approaches are not sufficient to allow the safe reuse of software components. To safely reuse software

Golok: Push-button Verification of Parameterized Systems

by Youssef Hanna, David Samuelson, Samik Basu, Hridesh Rajan , 2011
"... Parameterized systems verification is a long-standing problem, where the challenge is to verify that a property holds for all (infinite) instances of the parameterized system. Existing techniques aim to reduce this problem to checking the properties on smaller systems with a bound on the parameter r ..."
Abstract - Add to MetaCart
to be verified. Given the speci cation and the topology of the system, our technique generates the system-specific cut-off. We have realized our technique in a tool, Golok, which shows that it can be automated. We present the results of running Golok on 15 parameterized systems where we obtain smaller cut

The CASPA tool: Causality-based abstraction for security protocol analysis

by Michael Backes, Stefan Lorenz, Matteo Maffei, Kim Pecina - In Proceedings of the 20th international conference on Computer Aided Verification (CAV’08), Lecture Notes in Computer Science , 2008
"... Abstract. CASPA constitutes a push-button tool for automatically proving secrecy and authenticity properties of cryptographic protocols. The tool is grounded on a novel technique for causality-based abstraction of protocol executions that allows establishing proofs of security for an unbounded numbe ..."
Abstract - Cited by 5 (2 self) - Add to MetaCart
Abstract. CASPA constitutes a push-button tool for automatically proving secrecy and authenticity properties of cryptographic protocols. The tool is grounded on a novel technique for causality-based abstraction of protocol executions that allows establishing proofs of security for an unbounded

Automated Security Protocol Analysis with the AVISPA Tool

by Luca Viganò - In Proceedings of MFPS’05 , 2006
"... The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security Protocols and Applications. It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of automatic pr ..."
Abstract - Cited by 28 (5 self) - Add to MetaCart
The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security Protocols and Applications. It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of automatic

Hyper-Elastic Contact Analysis of a Push-Button Diaphragm

by Jeffrey R. Annis, Rockwell Automation, Allen Bradley
"... World market pressures demand that corporations continually bring new and innovative products to market as rapidly as possible. Traditional build and test product development methods in today’s competitive markets are too slow, costly, and rarely yield optimized robust product designs. Complex large ..."
Abstract - Add to MetaCart
workstations now allow engineers to rapidly evaluate and optimize rubber diaphragm seal designs prior to committing to costly prototypes and tooling. Presented is the non-linear finite element analysis of a rubber diaphragm seal utilizied in a pushbutton design. Analysis considerations encompassed, nonlinear

VeSTA: A Tool to Verify the Correct Integration of a Component in a Composite Timed System ⋆

by Jacques Julli, Hassan Mountassir, Emilie Oudot
"... Abstract. Vesta is a push-button tool for checking the correct integration of a component in an environment, for component-based timed systems. By correct integration, we mean that the local properties of the component are preserved when this component is merged into an environment. This correctness ..."
Abstract - Add to MetaCart
Abstract. Vesta is a push-button tool for checking the correct integration of a component in an environment, for component-based timed systems. By correct integration, we mean that the local properties of the component are preserved when this component is merged into an environment

IMECE2010-39147 PUSH–BUTTON DISCRETE EVENT SIMULATION FOR ANALYSIS OF FACTORY FLOOR OPERATIONS

by J. Michaloski, B. Raverdy, B. E. Lee, F. Proctor, S. Venkatesh, N. Bengtsson, A. Skoogh
"... In manufacturing, Discrete Event Simulation (DES) can be effectively used to model production and provide sustainabil-ity analysis of equipment and system operation by measuring throughput, capacity, and bottlenecks. DES allows analysis un-der different scenarios and conditions that can then be used ..."
Abstract - Add to MetaCart
resource allocation of shop floor machines to a batch of aerospace parts. Direct machine tool statistical parameterization into a Web-based DES leads to “Push–button ” automated simulations.

Simple Three Party Key Exchange Protocols via Twin Diffie-Hellman Problem

by H K Pathak , Manju Sanghi
"... Abstract In 2005, Abdalla and Pointcheval suggested a new variation of the computational DH assumption called chosen based computational Diffie Hellman (CCDH) and presented SPAKE-1 and SPAKE-2 simple password based authenticated key exchange protocols. Since then several three party password authen ..."
Abstract - Add to MetaCart
the existing protocols. The protocols are also verified using Automated Validation of Internet Security Protocols and Applications (AVISPA) which is a push button tool for the automated validation of security protocols and the result shows that they do not have any security flaws.

An Improved Password Based EAP Method for WiMAX with Formal Verification

by Anjani K. Rai, Vimal Kumar, Shivendu Mishra
"... IEEE 802.16e supports EAP (Extensible Authentication Protocol) for authentication, but do not specify the EAP method required for authentication. EAP-SPEKE and EAP-SRP are the strongest password based EAP methods. This paper examines these EAP methods and proposes an efficient password based authent ..."
Abstract - Add to MetaCart
authentication protocol for WiMAX. Proposed protocol is an improvement of EAP-SPEKE protocol and supports mutual authentication and key derivation. Protocol is verified using Automated Validation of Internet Security Protocols and Applications (AVISPA) which is a push button tool for the automated validation

Learning-Based Test Programming for Programmers

by Alex Groce, Alan Fern, Martin Erwig, Jervis Pinto, Tim Bauer
"... Abstract. While a diverse array of approaches to applying machine learning to testing has appeared in recent years, many efforts share three central challenges, two of which are not always obvious. First, learningbased testing relies on adapting the tests generated to the program being tested, based ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
. Finally, the usability of approaches by programmers is a challenge that has often been neglected. Programmers may wish to maintain more control of test generation than a ”push button ” tool generally provides, without becoming experts in software testing theory or machine learning algorithms
Next 10 →
Results 1 - 10 of 90
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University