Sciweavers

979 search results - page 126 / 196
» Automated Environment Generation for Software Model Checking
Sort
View
LICS
1999
IEEE
14 years 1 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
ASWEC
2010
IEEE
13 years 9 months ago
Support for Business Process Flexibility in Service Compositions: An Evaluative Survey
— Service compositions provide a promising way to realize and coordinate automated support for business activities and processes. These business processes and their automated sup...
Malinda Kapuruge, Jun Han, Alan W. Colman
ILP
2007
Springer
14 years 3 months ago
Applying Inductive Logic Programming to Process Mining
The management of business processes has recently received a lot of attention. One of the most interesting problems is the description of a process model in a language that allows ...
Evelina Lamma, Paola Mello, Fabrizio Riguzzi, Serg...
ICSE
2010
IEEE-ACM
13 years 7 months ago
Integrating legacy systems with MDE
Integrating several legacy software systems together is commonly performed with multiple applications of the Adapter Design Pattern in oo languages such as Java. The integration i...
Mickael Clavreul, Olivier Barais, Jean-Marc J&eacu...
JUCS
2008
115views more  JUCS 2008»
13 years 9 months ago
A Service-oriented Process to Develop Web Applications
: Web applications are widely disseminated, but, traditional development methods for this type of application still require a substantial amount of new modeling and programming. Cu...
Fábio Zaupa, Itana Maria de Souza Gimenes, ...