Sciweavers

1833 search results - page 36 / 367
» Mechanized Verification with Sharing
Sort
View
TELSYS
2002
126views more  TELSYS 2002»
13 years 10 months ago
Framework and Tool Support for Formal Verification of Highspeed Transfer Protocol Designs
Formal description techniques, verification methods, and their tool-based automated application meanwhile provide valuable support for the formal analysis of communication protocol...
Peter Herrmann, Heiko Krumm, Olaf Drögehorn, ...
CAISE
2007
Springer
14 years 5 months ago
A Semantic-based Approach for Compliance Management of Internal Controls in Business Processes
Enterprises require mechanisms to ensure that their business processes implement and fulfill internal controls in context of regulatory compliance such as Sarbanes Oxley Act. In th...
Kioumars Namiri, Nenad Stojanovic
ESWS
2007
Springer
14 years 5 months ago
A Model-driven Approach for Internal Controls Compliance in Business Processes
Enterprises require mechanisms to ensure that their business processes implement and fulfill internal controls in context of regulatory compliance such as Sarbanes Oxley Act. In th...
Kioumars Namiri, Nenad Stojanovic
ATAL
2005
Springer
14 years 4 months ago
Reciprocal resource sharing in P2P environments
Peer-to-peer (P2P) systems enable users to share resources in a networked environment without worrying about issues such as scalability and load balancing. Unlike exchange of good...
Dipyaman Banerjee, Sabyasachi Saha, Sandip Sen, Pr...
FCSC
2010
170views more  FCSC 2010»
13 years 8 months ago
Formal verification of concurrent programs with read-write locks
Abstract Read-write locking is an important mechanism to improve concurrent granularity, but it is difficult to reason about the safety of concurrent programs with read-write locks...
Ming Fu, Yu Zhang, Yong Li