BUST 发表于 2025-3-26 22:13:18
http://reply.papertrans.cn/87/8602/860143/860143_31.pngBRUNT 发表于 2025-3-27 01:14:07
Specification and Simulation of Real Time Concurrent Systems Using Standard SDL Toolsunately, SDL does not capture either duration properties of computations or policies of pre-emptive scheduling which are commonly employed to coordinate the execution of multiple concurrent tasks. We propose an extension of SDL expressivity which can capture both the aspects through annotations in tGyrate 发表于 2025-3-27 07:52:17
http://reply.papertrans.cn/87/8602/860143/860143_33.png昏迷状态 发表于 2025-3-27 12:42:57
http://reply.papertrans.cn/87/8602/860143/860143_34.png马笼头 发表于 2025-3-27 13:37:20
Using Projections for the Detection of Anomalous Behaviorsribe a projection transformation that, when applied to SDL components, produces semantic interface descriptions. Contrary to traditional object interfaces that restrict the declaration of operation signatures, semantic interfaces describe dialogues and constraints between components, and can be expl冷淡一切 发表于 2025-3-27 18:28:31
Applying Mutation Analysis to SDL Specificationsation as well. In this paper, the method is applied to SDL (Specification and Description Language) specifications. It is used to automate the process of conformance test generation and selection for telecommunications protocols. We present two algorithms for automatic test generation and selection.FLAGR 发表于 2025-3-28 02:01:00
Automatic Formal Model Generation and Analysis of SDL-level Petri net model which is analyzed using the Maria reachability analyzer. Compared to manual design of a formal model for the system this saves a lot of time and greatly reduces the human mistakes in creating the model. The design process is also considerably more efficient because it is possi持久 发表于 2025-3-28 05:00:48
Applying SDL to Formal Analysis of Security Systemsrity of communication systems, we have developed a methodology for the application of the formal analysis techniques commonly used in communication protocols to the analysis of cryptographic ones. In particular, we have extended the design and analysis phases with security properties. Our proposal u好开玩笑 发表于 2025-3-28 07:15:34
http://reply.papertrans.cn/87/8602/860143/860143_39.png羽饰 发表于 2025-3-28 11:28:46
http://reply.papertrans.cn/87/8602/860143/860143_40.png