In recent years, innovation in technologies such as web services, business process automation, etc., have motivated a new paradigm in the application development field to appear, k...
Model checking is an automated technique for verifying that a system satisfies a set of required properties. Such properties are typically expressed as temporal logic formulas, in...
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Class diagrams must be complemented with a set of system operations that describes how users can modify and evolve the system state. To be useful, such a set must be complete (i.e....
In Model Integrated Computing, it is often desirable to evaluate different design alternatives as they relate to issues of scalability. A typical approach to address scalability is...
Jeffrey G. Gray, Yuehua Lin, Jing Zhang, Steven No...