Sciweavers

556 search results - page 73 / 112
» Checking Interval Properties of Computations
Sort
View
IEEESCC
2005
IEEE
15 years 10 months ago
Using a Rigorous Approach for Engineering Web Service Compositions: A Case Study
In this paper we discuss a case study for the UK Police IT Organisation (PITO) on using a model-based approach to verifying web service composition interactions for a coordinated ...
Howard Foster, Sebastián Uchitel, Jeff Mage...
PG
1999
IEEE
15 years 8 months ago
Local Injectivity Conditions of 2D and 3D Uniform Cubic B-Spline Functions
Uniform cubic B-spline functions have been used for mapping functions in various areas such as image warping and morphing, 3D deformation, and volume morphing. The injectivity (on...
Yongchoel Choi, Seungyong Lee
CMS
2006
175views Communications» more  CMS 2006»
15 years 5 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin
CONCUR
2010
Springer
15 years 5 months ago
Kleene, Rabin, and Scott Are Available
We are concerned with the availability of systems, defined as the ratio between time of correct functioning and uptime. We propose to model guaranteed availability in terms of regu...
Jochen Hoenicke, Roland Meyer, Ernst-Rüdiger ...
ACTA
2007
96views more  ACTA 2007»
15 years 4 months ago
Recursive Petri nets
Abstract. In order to design and analyse complex systems, modelers need formal models with two contradictory requirements: a high expressivity and the decidability of behavioural p...
Serge Haddad, Denis Poitrenaud