Sciweavers

423 search results - page 8 / 85
» Formal access control analysis in the software development p...
Sort
View
INFOCOM
2006
IEEE
14 years 1 months ago
Performance Analysis of Contention Based Medium Access Control Protocols
—This paper studies the performance of contention based medium access control (MAC) protocols. In particular, a simple and accurate technique for estimating the throughput of the...
Gaurav Sharma, Ayalvadi J. Ganesh, Peter B. Key
WOSP
2004
ACM
14 years 29 days ago
Analysing UML 2.0 activity diagrams in the software performance engineering process
In this paper we present an original method of analysing the newlyrevised UML2.0 activity diagrams. Our analysis method builds on our formal interpretation of these diagrams with ...
C. Canevet, Stephen Gilmore, Jane Hillston, Le&ium...
IFIP
2009
Springer
13 years 5 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
ICSE
2000
IEEE-ACM
13 years 11 months ago
Producing more reliable software: mature software engineering process vs. state-of-the-art technology?
: Producing More Reliable Software: Mature Software Engineering Process vs. State-of-the-Art Technology? A customer of high assurance software recently sponsored a software enginee...
James C. Widmaier
APN
2006
Springer
13 years 11 months ago
On the Integration of UML and Petri Nets in Software Development
Abstract. Software performance engineering deals with the consideration of quantitative analysis of the behaviour of software systems from the early development phases in the life ...
Javier Campos, José Merseguer