Sciweavers

979 search results - page 126 / 196
» Automated Environment Generation for Software Model Checking
Sort
View
134
Voted
LICS
1999
IEEE
15 years 6 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
ASWEC
2010
IEEE
15 years 2 months ago
Support for Business Process Flexibility in Service Compositions: An Evaluative Survey
— Service compositions provide a promising way to realize and coordinate automated support for business activities and processes. These business processes and their automated sup...
Malinda Kapuruge, Jun Han, Alan W. Colman
124
Voted
ILP
2007
Springer
15 years 8 months ago
Applying Inductive Logic Programming to Process Mining
The management of business processes has recently received a lot of attention. One of the most interesting problems is the description of a process model in a language that allows ...
Evelina Lamma, Paola Mello, Fabrizio Riguzzi, Serg...
ICSE
2010
IEEE-ACM
15 years 24 days ago
Integrating legacy systems with MDE
Integrating several legacy software systems together is commonly performed with multiple applications of the Adapter Design Pattern in oo languages such as Java. The integration i...
Mickael Clavreul, Olivier Barais, Jean-Marc J&eacu...
108
Voted
JUCS
2008
115views more  JUCS 2008»
15 years 2 months ago
A Service-oriented Process to Develop Web Applications
: Web applications are widely disseminated, but, traditional development methods for this type of application still require a substantial amount of new modeling and programming. Cu...
Fábio Zaupa, Itana Maria de Souza Gimenes, ...