BUST
发表于 2025-3-26 22:13:18
http://reply.papertrans.cn/87/8602/860143/860143_31.png
BRUNT
发表于 2025-3-27 01:14:07
Specification and Simulation of Real Time Concurrent Systems Using Standard SDL Toolsunately, SDL does not capture either duration properties of computations or policies of pre-emptive scheduling which are commonly employed to coordinate the execution of multiple concurrent tasks. We propose an extension of SDL expressivity which can capture both the aspects through annotations in t
Gyrate
发表于 2025-3-27 07:52:17
http://reply.papertrans.cn/87/8602/860143/860143_33.png
昏迷状态
发表于 2025-3-27 12:42:57
http://reply.papertrans.cn/87/8602/860143/860143_34.png
马笼头
发表于 2025-3-27 13:37:20
Using Projections for the Detection of Anomalous Behaviorsribe a projection transformation that, when applied to SDL components, produces semantic interface descriptions. Contrary to traditional object interfaces that restrict the declaration of operation signatures, semantic interfaces describe dialogues and constraints between components, and can be expl
冷淡一切
发表于 2025-3-27 18:28:31
Applying Mutation Analysis to SDL Specificationsation as well. In this paper, the method is applied to SDL (Specification and Description Language) specifications. It is used to automate the process of conformance test generation and selection for telecommunications protocols. We present two algorithms for automatic test generation and selection.
FLAGR
发表于 2025-3-28 02:01:00
Automatic Formal Model Generation and Analysis of SDL-level Petri net model which is analyzed using the Maria reachability analyzer. Compared to manual design of a formal model for the system this saves a lot of time and greatly reduces the human mistakes in creating the model. The design process is also considerably more efficient because it is possi
持久
发表于 2025-3-28 05:00:48
Applying SDL to Formal Analysis of Security Systemsrity of communication systems, we have developed a methodology for the application of the formal analysis techniques commonly used in communication protocols to the analysis of cryptographic ones. In particular, we have extended the design and analysis phases with security properties. Our proposal u
好开玩笑
发表于 2025-3-28 07:15:34
http://reply.papertrans.cn/87/8602/860143/860143_39.png
羽饰
发表于 2025-3-28 11:28:46
http://reply.papertrans.cn/87/8602/860143/860143_40.png