Sciweavers

18924 search results - page 15 / 3785
» Conformance of Distributed Systems
Sort
View
BPM
2005
Springer
113views Business» more  BPM 2005»
14 years 2 months ago
Conformance Testing: Measuring the Fit and Appropriateness of Event Logs and Process Models
Most information systems log events (e.g., transaction logs, audit trails) to audit and monitor the processes they support. At the same time, many of these processes have been expl...
Anne Rozinat, Wil M. P. van der Aalst
ICOIN
2001
Springer
14 years 1 months ago
A Conformance Testing Method for Communication Protocols Modeled as Concurrent DFSMs
According to the progress of high-speed networks, many communication protocols are specified as concurrent systems. Such systems can be modeled as concurrent deterministic FSMs (D...
Atsushi Fukada, Akio Nakata, Junji Kitamichi, Teru...
MONTEREY
2007
Springer
14 years 2 months ago
Logic-Based Regulatory Conformance Checking
In this paper, we describe an approach to formally assess whether an organization conforms to a body of regulation. Conformance is cast as a model checking question where the regul...
Nikhil Dinesh, Aravind K. Joshi, Insup Lee, Oleg S...
IPPS
2003
IEEE
14 years 2 months ago
So Many States, So Little Time: Verifying Memory Coherence in the Cray X1
This paper investigates a complexity-effective technique for verifying a highly distributed directory-based cache coherence protocol. We develop a novel approach called “witnes...
Dennis Abts, Steve Scott, David J. Lilja
KBSE
2007
IEEE
14 years 3 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr