Sciweavers

3224 search results - page 492 / 645
» On Checking Model Checkers
Sort
View
CSL
2009
Springer
14 years 4 months ago
Algorithmic Analysis of Array-Accessing Programs
For programs whose data variables range over boolean or finite domains, program verification is decidable, and this forms the basis of recent tools for software model checking. I...
Rajeev Alur, Pavol Cerný, Scott Weinstein
FSEN
2009
Springer
14 years 4 months ago
Automated Translation and Analysis of a ToolBus Script for Auctions
Abstract. ToolBus allows to connect tools via a software bus. Programming is done using the scripting language Tscript, which is based on the process algebra ACP. In previous work ...
Wan Fokkink, Paul Klint, Bert Lisser, Yaroslav S. ...
KI
2009
Springer
14 years 4 months ago
Surrogate Constraint Functions for CMA Evolution Strategies
Many practical optimization problems are constrained black boxes. Covariance Matrix Adaptation Evolution Strategies (CMA-ES) belong to the most successful black box optimization me...
Oliver Kramer, André Barthelmes, Günte...
ISORC
2008
IEEE
14 years 4 months ago
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
In this paper, a Role-based Access Control (RBAC) model is applied and extended to a multimedia version called Multi-Role Based Access Control (MRBAC), which can fully support the...
Na Zhao, Min Chen, Shu-Ching Chen, Mei-Ling Shyu
HICSS
2007
IEEE
140views Biometrics» more  HICSS 2007»
14 years 4 months ago
Design Pattern Evolution and Verification Using Graph Transformation
This paper presents a graph transformation based approach to design pattern evolution. An evolution of a design pattern includes modifications of pattern elements, such as classes...
Chunying Zhao, Jun Kong, Kang Zhang