منابع مشابه
Model Checking Social Network Models
A social network service is a platform to build social relations among people sharing similar interests and activities. The underlying structure of a social networks service is the social graph, where nodes represent users and the arcs represent the users’ social links and other kind of connections. One important concern in social networks is privacy: what others are (not) allowed to know about...
متن کاملModel checking test models
This thesis is about model checking testing models. These testing models are used during the automated testing of software systems and encode symbolic transition systems that are necessarily open. Open models need to be closed before they can be model checked by LTSmin. The open models are closed by the automatic generation and insertion of an environment process. They are then translated to DV...
متن کاملModel Checking Gigantic Markov Models
Probabilistic model checking – the verification of models incorporating random phenomena – has enjoyed a rapid increase of interest. Thanks to the availability of mature tool support and efficient verification algorithms, probabilistic model checking has been successfully applied to case studies from various areas, such as randomized (distributed) algorithms, planning and AI, security, hardware...
متن کاملLinear Social Network Models
Financial support has been supplied to Blume by NSF grant CCF-0910940 and by WWTF Grant “Die Evolution von Normen und Konventionen in der Wirtschaft”, Brock and Durlauf by the Vilas Professorship, and Durlauf by the University of Wisconsin Graduate School, Laurits Christensen Chair in Economics, and Institute for New Economic Thinking, all of which is greatly appreciated. Hon Ho Kwok and Xiangr...
متن کاملModel Checking Large Network Protocol Implementations
Network protocols must work. The effects of protocol specification or implementation errors range from reduced performance, to security breaches, to bringing down entire networks. However, network protocols are difficult to test due to the exponential size of the state space they define. Ideally, a protocol implementation must be validated against all possible events (packet arrivals, packet lo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronic Proceedings in Theoretical Computer Science
سال: 2017
ISSN: 2075-2180
DOI: 10.4204/eptcs.256.17