Probabilistic model checking in practice: case studies with PRISM
暂无分享,去创建一个
[1] Marta Z. Kwiatkowska,et al. Symbolic model checking for probabilistic timed automata , 2007, Inf. Comput..
[2] Jie Han,et al. A system architecture solution for unreliable nanoelectronic devices , 2002 .
[3] J. von Neumann,et al. Probabilistic Logic and the Synthesis of Reliable Organisms from Unreliable Components , 1956 .
[4] Annabelle McIvera,et al. An elementary proof that Herman ’ s Ring is ( N 2 ) , 2005 .
[5] Sandeep K. Shukla,et al. Formal analysis and validation of continuous-time Markov chain based system level power management strategies , 2002, Seventh IEEE International High-Level Design Validation and Test Workshop, 2002..
[6] Wan Fokkink,et al. Simplifying Itai-Rodeh Leader Election for Anonymous Rings , 2005, Electron. Notes Theor. Comput. Sci..
[7] Marta Z. Kwiatkowska,et al. Verifying Randomized Byzantine Agreement , 2002, FORTE.
[8] Paola Lecca,et al. Cell Cycle Control in Eukaryotes: A BioSpi model , 2007, Electron. Notes Theor. Comput. Sci..
[9] Marta Z. Kwiatkowska,et al. Probabilistic Model Checking of the IEEE 802.11 Wireless Local Area Network Protocol , 2002, PAPM-PROBMIV.
[10] Andrea Maggiolo-Schettini,et al. Automatic Analysis of a Non-Repudiation Protocol , 2005, Electron. Notes Theor. Comput. Sci..
[11] Marta Z. Kwiatkowska,et al. Automated Verification of a Randomized Distributed Consensus Protocol Using Cadence SMV and PRISM , 2001, CAV.
[12] Christel Baier,et al. Model-Checking Algorithms for Continuous-Time Markov Chains , 2002, IEEE Trans. Software Eng..
[13] Marta Z. Kwiatkowska,et al. Performance analysis of probabilistic timed automata using digital clocks , 2003, Formal Methods Syst. Des..
[14] Holger Hermanns,et al. A Markov Chain Model Checker , 2000, TACAS.
[15] Thomas Hérault,et al. Probabilistic Model Checking of the CSMA/CD Protocol Using PRISM and APMC , 2005, AVoCS.
[16] Kang G. Shin,et al. Real-time dynamic voltage scaling for low-power embedded operating systems , 2001, SOSP.
[17] Sandeep K. Shukla,et al. Evaluating the reliability of NAND multiplexing with PRISM , 2005, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[18] Sandeep K. Shukla,et al. Using probabilistic model checking for dynamic power management , 2005, Formal Aspects of Computing.
[19] Marie Duflot,et al. A formal analysis of bluetooth device discovery , 2006, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[20] Marta Z. Kwiatkowska,et al. Probabilistic Model Checking of Deadline Properties in the IEEE 1394 FireWire Root Contention Protocol , 2003, Formal Aspects of Computing.
[21] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[22] Vitaly Shmatikov,et al. Analysis of probabilistic contract signing , 2002, J. Comput. Secur..
[23] Jan J. M. M. Rutten,et al. Mathematical techniques for analyzing concurrent and probabilistic systems , 2004, CRM monograph series.
[24] Vitaly Shmatikov,et al. Probabilistic Model Checking of an Anonymity System , 2004 .
[25] Mariëlle Stoelinga,et al. Alea jacta est : verification of probabilistic, real-time and parametric systems , 2002 .
[26] Marta Z. Kwiatkowska,et al. PRISM 2.0: a tool for probabilistic model checking , 2004, First International Conference on the Quantitative Evaluation of Systems, 2004. QEST 2004. Proceedings..
[27] Ted Herman,et al. Probabilistic Self-Stabilization , 1990, Information Processing Letters.
[28] Vitaly Shmatikov. Probabilistic analysis of an anonymity system , 2004, J. Comput. Secur..
[29] Annabelle McIver,et al. An elementary proof that Herman's Ring is Theta (N2) , 2005, Inf. Process. Lett..