Sciweavers

715 search results - page 107 / 143
» Application of Formal Methods to the Development of a Softwa...
Sort
View
FASE
2004
Springer
14 years 2 months ago
Modeling Role-Based Access Control Using Parameterized UML Models
Abstract. Organizations use Role-Based Access Control (RBAC) to protect computer-based resources from unauthorized access. There has been considerable work on formally specifying R...
Dae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na ...
URBAN
2008
128views more  URBAN 2008»
13 years 8 months ago
Discerning landslide susceptibility using rough sets
Rough set theory has been primarily known as a mathematical approach for analysis of a vague description of objects. This paper explores the use of rough set theory to manage the ...
Pece V. Gorsevski, Piotr Jankowski
WICSA
2004
13 years 10 months ago
An Architectural Approach to Mobility - The Handover Case Study
COMMUNITY is a formal approach to software architecture. Its main characteristics are: a precise, yet intuitive mathematical semantics based on categorical diagrams; a clear separ...
Cristóvão Oliveira, Michel Wermeling...
AINA
2010
IEEE
13 years 5 months ago
Neural Network Trainer through Computer Networks
- This paper introduces a neural network training tool through computer networks. The following algorithms, such as neuron by neuron (NBN) [1][2], error back propagation (EBP), Lev...
Nam Pham, Hao Yu, Bogdan M. Wilamowski
AGTIVE
2007
Springer
14 years 28 days ago
Transforming Timeline Specifications into Automata for Runtime Monitoring
Abstract. In runtime monitoring, a programmer specifies code to execute whenever a sequence of events occurs during program execution. Previous and related work has shown that runt...
Eric Bodden, Hans Vangheluwe