Sciweavers

1833 search results - page 142 / 367
» Mechanized Verification with Sharing
Sort
View
ICECCS
2007
IEEE
120views Hardware» more  ICECCS 2007»
15 years 8 months ago
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository
Parts of the CICS transaction processing system were modelled formally in the 1980s in a collaborative project between IBM Hursley Park and Oxford University Computing Laboratory....
Leo Freitas, Konstantinos Mokos, Jim Woodcock
APSCC
2008
IEEE
15 years 6 months ago
Contract-Based Security Monitors for Service Oriented Software Architecture
Monitors have been used for real-time systems to ensure proper behavior; however, most approaches do not allow for the addition of relevant fields required to identify and react t...
Alexander M. Hoole, Issa Traoré
ATAL
2010
Springer
15 years 5 months ago
Strategic executions of choreographed timed normative multi-agent systems
This paper proposes a combined mechanism for coordinating agents in timed normative multi-agent systems. Timing constraints in a multi-agent system make it possible to force actio...
Lacramioara Astefanoaei, Frank S. de Boer, Mehdi D...
VTC
2006
IEEE
152views Communications» more  VTC 2006»
15 years 10 months ago
Cross-Layer Interaction Between TCP and UMTS RRM Scheduling Strategies
— In the third generation wireless system UMTS, Radio Resource Management (RRM) functions should encompass scheduling algorithms. In particular, scheduling mechanisms play a key ...
Juan Rendón, Anna Sfairopoulou, Ramon Ferr&...
IHIS
2005
ACM
15 years 10 months ago
An architecture for the interoperability of workflow models
The goal of this work is to contribute to the field of interoperability of Workflow models. To achieve this interoperability, we have built a generic architecture that s three lev...
Salah Hamri, Mahmoud Boufaïda, Nacer Boudjlid...