Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,384,131 papers from all fields of science
Search
Sign In
Create Free Account
CoreASM
CoreASM is an open source project (licensed under Academic Free License version 3.0) that focuses on the design of a lean executable ASM (Abstract…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
Abstract state machines
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Debugging Abstract StateMachine Specifications : An Extension of CoreASM
Marcel Dausend
,
M. Stegmaier
,
Alexander Raschke
2016
Corpus ID: 16543510
We introduce a debugger component as an extension of CoreASM to simplify validation of (complex) ASM specifications. As a basis…
Expand
2013
2013
Formal Modeling of Trust-Based Access Control in Dynamic Coalitions
Nadim Sarrouh
IEEE 37th Annual Computer Software and…
2013
Corpus ID: 15598984
Modern networking technologies, such as Cloud or SOA, enable cooperations and individuals to form dynamic coalitions for…
Expand
2012
2012
A prototype implementation for situation analysis using ASP and CoreASM
Zahra Vaseqi
2012
Corpus ID: 33009215
Answer Set Programming (ASP) is a non-monotonic declarative language that is widely applied to different areas in science and…
Expand
2011
2011
Simulating a Flash File System with CoreASM and Eclipse
D. Haneberg
,
Maximilian Junker
,
G. Schellhorn
,
W. Reif
,
G. Ernst
GI-Jahrestagung
2011
Corpus ID: 16640360
The formal specification of a file system for flash memory is the first step towards its verification. But creating such a formal…
Expand
2010
2010
Bârun: A Scripting Language for CoreASM
M. Altenhofen
,
Roozbeh Farahbod
International Workshops on Abstract State…
2010
Corpus ID: 41926273
Scenarios have been used in various stages of the software development process, in particular in requirement elicitation and…
Expand
2010
2010
Some Improvements on Model Checking CoreASM Models of Security Protocols
Zhenju Zhao
,
Feng Liu
,
Jianhua Peng
,
Danqing Huang
,
Rui Xue
,
Zhenfeng Zhang
Second International Symposium on Data, Privacy…
2010
Corpus ID: 41462725
This paper presents a tool called ASM-SPV (Abstract State Machines-Security Protocols Verifier) for verifying security protocols…
Expand
2009
2009
Relaxing Restrictions on Invariant Composition in the B Method by Ownership Control a laSpec#
Sylvain Boulmé
,
Marie-Laure Potet
Rigorous Methods for Software Construction and…
2009
Corpus ID: 11899580
This paper deals with modular verification of component invariants in the B Method. On the one hand, B imposes severe…
Expand
2007
2007
Mastermind : A Computational Framework for Studying Physical Crime
U. Glässer
,
Piper J. Jackson
,
M. Vajihollahi
2007
Corpus ID: 2573092
Criminal events are understood in the context of complex interactions between the most important elements of crime, namely: the…
Expand
2006
2006
SPECIFICATION LANGUAGE DESIGN CONCEPTS: AGGREGATION AND EXTENSIBILITY IN CoreAS M
M. Memon
2006
Corpus ID: 61615282
Abstract State Machines (ASMs) are a proven methodology for the precise high-level specification of formal requirements in early…
Expand
2006
2006
Design exploration and experimental validation of abstract requirements
Roozbeh Farahbod
,
V. Gervasi
,
Uwe Gl¨asser
,
M. Memon
2006
Corpus ID: 6818686
. How can one cope with the notorious problem of establishing the correctness and completeness of abstract functional…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE