Sciweavers

5255 search results - page 933 / 1051
» Formal Methods for Privacy
Sort
View
FM
2009
Springer
95views Formal Methods» more  FM 2009»
15 years 7 months ago
On the Complexity of Synthesizing Relaxed and Graceful Bounded-Time 2-Phase Recovery
The problem of enforcing bounded-time 2-phase recovery in real-time programs is often necessitated by conflict between faulttolerance requirements and timing constraints. In this ...
Borzoo Bonakdarpour, Sandeep S. Kulkarni
SBMF
2009
Springer
126views Formal Methods» more  SBMF 2009»
15 years 7 months ago
Undecidability Results for Distributed Probabilistic Systems
Abstract. In the verification of concurrent systems involving probabilities, the aim is to find out the maximum/minimum probability that a given event occurs (examples of such ev...
Sergio Giro
121
Voted
AIME
2001
Springer
15 years 7 months ago
NasoNet, Joining Bayesian Networks and Time to Model Nasopharyngeal Cancer Spread
Abstract. Cancer spread is a non-deterministic dynamic process. As a consequence, the design of an assistant system for the diagnosis and prognosis of the extent of a cancer should...
Severino F. Galán, Francisco Aguado, Franci...
CAISE
2001
Springer
15 years 7 months ago
Using UML Action Semantics for Executable Modeling and Beyond
The UML lacks precise and formal foundations for several constructs such as transition guards or method bodies, for which it resorts to semantic loopholes in the form of “uninter...
Gerson Sunyé, François Pennaneac'h, ...
144
Voted
ER
2001
Springer
163views Database» more  ER 2001»
15 years 7 months ago
Towards Ontologically Based Semantics for UML Constructs
Abstract. Conceptual models are formal descriptions of application domains that are used in early stages of system development to support requirements analysis. The Unified Modeli...
Joerg Evermann, Yair Wand