Du mur fixe au mur mobile

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Rmo Description in Mur'

(d2) calls Dep Reg() which returns true if the preceding instruction is writing the same register that is read by the following instruction (strictly speaking, the same temporary location in register renaming scheme). Note that the dependence through the condition code register is checked separately, since branch instructions read the condition code register which is modified by such instructio...

متن کامل

Parallelizing the Mur' Veriier

With the use of state and memory reduction techniques in veri cation by explicit state enumeration, runtime becomes a major limiting factor. We describe a parallel version of the explicit state enumeration veri er Mur' for distributed memory multiprocessors and networks of workstations that is based on the message passing paradigm. In experiments with three complex cache coherence protocols, pa...

متن کامل

The Mur' Verification System

Computer Systems Laboratory Stanford University Email: [email protected] Abstract. This is a brief overview of the Mur' verification system. The Mur' description language Mur' is both a description language and a verifier for finite state concurrent systems [DDHY92]. It is appropriate for protocols and finite-state systems which can reasonably be modelled as a collection of processes that ru...

متن کامل

412 Sexual Dimorphism of Mur

The sex-dependent differences in serum levels of complement components have been reported concerning C4 (1), C5 (2, 3), C6 (3), C4-binding protein (C4-bp) ~ (4), and sex-limited protein (Slp) (5) in the mouse complement system. The serum levels o f these components in adult mice are always higher in males than in females within each inbred strain and are strongly under hormonal control. With re...

متن کامل

Automated Analysis of Cryptographic Protocols Using Mur'

A methodology is presented for using a general-purpose state enumeration tool, Mur', to analyze cryptographic and security-related protocols. We illustrate the feasibility of the approach by analyzing the Needham-Schroeder protocol, nding a known bug in a few seconds of computation time, and analyzing variants of Kerberos and the faulty TMN protocol used in another comparative study. The eecien...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mémoire(s), identité(s), marginalité(s) dans le monde occidental contemporain

سال: 2009

ISSN: 1951-6789

DOI: 10.4000/mimmoc.429