Using the ASTRAL model checker to analyze mobile IP

被引:0
|
作者
Univ of California, Santa Barbara, CA, United States [1 ]
机构
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
12
引用
收藏
相关论文
共 50 条
  • [1] Random walk model to analyze the costs of hierarchical mobile IP
    Liu, Yu
    Wang, Yu-Mei
    Deng, Hui
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2006, 29 (02): : 65 - 69
  • [2] A Method to Analyze Predicate Transition Nets Using SPIN Model Checker
    Alam, Dewan Mohammad Moksedul
    He, Xudong
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2017, 27 (9-10) : 1455 - 1481
  • [3] Using Model Checker to Analyze and Test Digital Circuits with Regard to Delay Faults
    Strnadel, Josef
    2021 24TH INTERNATIONAL SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS & SYSTEMS (DDECS), 2021, : 111 - 114
  • [4] Mobile IP using private IP addresses
    Kato, T
    Idoue, A
    Yokota, H
    PROCEEDINGS OF THE SIXTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, 2001, : 491 - 497
  • [5] Fault localization using a model checker
    Griesmayer, Andreas
    Staber, Stefan
    Bloem, Roderick
    SOFTWARE TESTING VERIFICATION & RELIABILITY, 2010, 20 (02): : 149 - 173
  • [6] A mobile phone malicious software detection model with behavior checker
    Yap, TS
    Ewe, HT
    WEB AND COMMUNICATION TECHNOLOGIES AND INTERNET -RELATED SOCIAL ISSUES - HSI 2005, 2005, 3597 : 57 - 65
  • [7] USING A MODEL CHECKER TO VERIFY PROGRAMS
    DEVILLIERS, PJA
    SOUTH AFRICAN JOURNAL OF PHILOSOPHY-SUID-AFRIKAANSE TYDSKRIF VIR WYSBEGEERTE, 1988, 7 (02): : 113 - 117
  • [8] Using the Probabilistic Model Checker PRISM to analyze H-OTBA Algorithm in Optical Burst Switching (OBS) Networks
    Zagorskis, Viktors
    2015 ADVANCES IN WIRELESS AND OPTICAL COMMUNICATIONS (RTUWO), 2015, : 132 - 137
  • [9] USING THE TECHNOLOGY ACCEPTANCE MODEL TO ANALYZE EASE OF USE OF A MOBILE COMMUNICATION SYSTEM
    Wang, Chih-Chiang
    Tsai, Chih-Yung
    Lu, Ming-Te
    SOCIAL BEHAVIOR AND PERSONALITY, 2011, 39 (01): : 65 - 69
  • [10] Secure mobile IP using IP security primitives
    Inoue, A
    Ishiyama, M
    Fukumoto, A
    Okamoto, T
    SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 1997, : 235 - 241