Sciweavers

1036 search results - page 135 / 208
» Incompleteness of Behavioral Logics
Sort
View
AINA
2007
IEEE
14 years 4 months ago
Pervasive Computing with Frugal Objects
— This paper presents a computing model for resource-limited mobile devices that might be ubiquitously deployed in private and business environments. The model integrates a stron...
Benoît Garbinato, Rachid Guerraoui, Jarle Hu...
KBSE
2005
IEEE
14 years 3 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
BPM
2005
Springer
181views Business» more  BPM 2005»
14 years 3 months ago
WSMX Process Mediation Based on Choreographies
Abstract. One of the most difficult obstacles Web Services have to overcome in the attempt to exploit the true potential of the World Wide Web is heterogeneity. Caused by the natur...
Emilia Cimpian, Adrian Mocan
INFOCOM
1997
IEEE
14 years 2 months ago
Analyzing Non-Determinism in Telecommunication Services Using P-Invariant of Petri-Net Model
The non-deterministic behaviors in telecommunication services are well-known as one of the most typical Feature Interactions, and they should be detected and eliminated from the t...
Masahide Nakamura, Yoshiaki Kakuda, Tohru Kikuno
DAC
1994
ACM
14 years 2 months ago
Automatic Verification of Pipelined Microprocessors
Abstract - We address the problem of automatically verifying large digital designs at the logic level, against high-level specifications. In this paper, we present a methodology wh...
Vishal Bhagwati, Srinivas Devadas