Sciweavers

955 search results - page 54 / 191
» Model Checking Operator Procedures
Sort
View
SACMAT
2010
ACM
14 years 1 months ago
Role updating for assignments
The role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are usually unde...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
WSC
2004
13 years 10 months ago
Validation and Verification of Simulation Models
This paper discusses validation and verification of simulation models. The different approaches to deciding model validity are presented; how model validation and verification rel...
Robert G. Sargent
ISSTA
2000
ACM
14 years 1 months ago
Finding bugs with a constraint solver
A method for finding bugs in code is presented. For given small numbers j and k, the code of a procedure is translated into a relational formula whose models represent all executi...
Daniel Jackson, Mandana Vaziri
FORTE
2007
13 years 10 months ago
Transactional Reduction of Component Compositions
Behavioural protocols are beneficial to Component-Based Software Engineering and Service-Oriented Computing as they foster automatic procedures for discovery, composition, composi...
Serge Haddad, Pascal Poizat
CADE
2006
Springer
14 years 13 days ago
A Sufficient Completeness Checker for Linear Order-Sorted Specifications Modulo Axioms
We present a tool for checking the sufficient completeness of linear, order-sorted equational specifications modulo associativity, commutativity, and identity. Our tool treats this...
Joe Hendrix, José Meseguer, Hitoshi Ohsaki