AbstractThe purpose of this paper is to illustrate a compositional proof method for communicating systems; that is, a method in which a property P of a complete system is demonstrated by first decomposing the system, then demonstrating properties of the subsystems which are strong enough to entail property P for the complete system. In any compositional proof method, it is essential that one can abstract away the behavioural aspects of the subsystem which are irrelevant in the context of the complete system. Our method is an extension of the well established notion of bisimulation; it is called relative bisimulation, and was developed specifically to allow for such abstractions. We illustrate the method in a proof of correctness for a versi...
A version of the Alternating Bit Protocol is verified by means of Process Algebra. To avoid a combi...
Real-world communication protocols are often built out of a number of simpler protocols that cater f...
Abstract. We consider abstract specifications of cryptographic protocols which are both suitable for...
AbstractThe purpose of this paper is to illustrate a compositional proof method for communicating sy...
AbstractThe purpose of this paper is to present and illustrate a new compositional proof method for ...
We present a method for specification and verification of distributed systems that communicate via ...
International audienceOne approach to verify a property expressed as a modal μ-calculus formula on a...
This paper provides a necessary and sufficient condition for the compositional verification of a con...
. In this paper, we apply a compositional proof technique to an automatic verification of the correc...
A distributed real-time arbitration protocol is specified and verified using an assertional method. ...
Formal methods to specify and verify concurrent programs with synchronous message passing are discus...
Specification, construction and verification of programs should be done in a compositional way. This...
International audienceSharp bisimulation is a refinement of branching bisimulation, parameterized by...
This is a companion archive of the following paper: Frédéric Lang, Radu Mateescu, and Franco Mazzan...
Specification, construction and verification of programs should be done in a compositional way. This...
A version of the Alternating Bit Protocol is verified by means of Process Algebra. To avoid a combi...
Real-world communication protocols are often built out of a number of simpler protocols that cater f...
Abstract. We consider abstract specifications of cryptographic protocols which are both suitable for...
AbstractThe purpose of this paper is to illustrate a compositional proof method for communicating sy...
AbstractThe purpose of this paper is to present and illustrate a new compositional proof method for ...
We present a method for specification and verification of distributed systems that communicate via ...
International audienceOne approach to verify a property expressed as a modal μ-calculus formula on a...
This paper provides a necessary and sufficient condition for the compositional verification of a con...
. In this paper, we apply a compositional proof technique to an automatic verification of the correc...
A distributed real-time arbitration protocol is specified and verified using an assertional method. ...
Formal methods to specify and verify concurrent programs with synchronous message passing are discus...
Specification, construction and verification of programs should be done in a compositional way. This...
International audienceSharp bisimulation is a refinement of branching bisimulation, parameterized by...
This is a companion archive of the following paper: Frédéric Lang, Radu Mateescu, and Franco Mazzan...
Specification, construction and verification of programs should be done in a compositional way. This...
A version of the Alternating Bit Protocol is verified by means of Process Algebra. To avoid a combi...
Real-world communication protocols are often built out of a number of simpler protocols that cater f...
Abstract. We consider abstract specifications of cryptographic protocols which are both suitable for...