Sciweavers

1003 search results - page 77 / 201
» A modeling approach and reference models for the analysis of...
Sort
View
JSW
2007
120views more  JSW 2007»
13 years 7 months ago
Constraint-based Model Transformation: Tracing the Preservation of Semantic Properties
Abstract— We present and evaluate a novel constraintbased model transformation approach that implements a preservation-centric view. The proposed framework comprises formal prese...
Thomas Triebsees
BPM
2009
Springer
146views Business» more  BPM 2009»
14 years 2 months ago
Instantaneous Soundness Checking of Industrial Business Process Models
We report on a case study on control-flow analysis of business process models. We checked 735 industrial business process models from financial services, telecommunications and o...
Dirk Fahland, Cédric Favre, Barbara Jobstma...
TDSC
2011
13 years 2 months ago
An Obfuscation-Based Approach for Protecting Location Privacy
—The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the phys...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
JSW
2007
106views more  JSW 2007»
13 years 7 months ago
Destabilization of Terrorist Networks through Argument Driven Hypothesis Model
— Social network analysis has been used for quite some time to analyze and understand the behavior of nodes in the network. Theses nodes could be individuals or group of persons,...
Dil Muhammad Akbar Hussain
TII
2011
206views Education» more  TII 2011»
13 years 2 months ago
Timing-Failure Risk Assessment of UML Design Using Time Petri Net Bound Techniques
Abstract—Software systems that do not meet their timing constraints can cause risks. In this work, we propose a comprehensive method for assessing the risk of timing failure by e...
Simona Bernardi, Javier Campos, José Merseg...