Sciweavers

623 search results - page 16 / 125
» Declarative Network Verification
Sort
View
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 1 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
ICSE
2003
IEEE-ACM
14 years 21 days ago
A Tutorial on Feature Oriented Programming and Product-Lines
ct Feature Oriented Programming (FOP) is a design methodology and tools for program synthesis. The goal is to specify a target program in terms of the features that it offers, and ...
Don S. Batory
ASE
2004
108views more  ASE 2004»
13 years 7 months ago
CODEWEAVE: Exploring Fine-Grained Mobility of Code
er is concerned with an abstract exploration of code mobility constructs designed for use in settings where the level of granularity associated with the mobile units exhibits sign...
Cecilia Mascolo, Gian Pietro Picco, Gruia-Catalin ...
ICDT
2009
ACM
248views Database» more  ICDT 2009»
14 years 8 months ago
Automatic verification of data-centric business processes
We formalize and study business process systems that are centered around "business artifacts", or simply "artifacts". This approach focuses on data records, kn...
Alin Deutsch, Richard Hull, Fabio Patrizi, Victor ...
SEUS
2010
IEEE
13 years 5 months ago
Ubiquitous Verification of Ubiquitous Systems
Abstract. Ubiquitous embedded computing systems expected to reliably perform one or more relevant tasks need design and verification methods currently not available. New envisioned...
Reinhard Wilhelm, Matteo Maffei