Sciweavers

3224 search results - page 512 / 645
» On Checking Model Checkers
Sort
View
AEI
2007
119views more  AEI 2007»
13 years 10 months ago
Exploring the CSCW spectrum using process mining
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst
AMC
2008
106views more  AMC 2008»
13 years 10 months ago
A non-binary constraint ordering heuristic for constraint satisfaction problems
Abstract Nowadays many real problems can be modelled as Constraint Satisfaction Problems (CSPs). A search algorithm for constraint programming requires an order in which variables ...
Miguel A. Salido
CORR
2010
Springer
98views Education» more  CORR 2010»
13 years 10 months ago
Extended Computation Tree Logic
We introduce a generic extension of the popular branching-time logic CTL which refines the temporal until and release operators with formal languages. For instance, a language may ...
Roland Axelsson, Matthew Hague, Stephan Kreutzer, ...
CORR
2010
Springer
71views Education» more  CORR 2010»
13 years 10 months ago
Sampled Semantics of Timed Automata
Sampled semantics of timed automata is a nite approximation of their dense time behavior. While the former is closer to the actual software or hardware systems ed granularity of ti...
Parosh Aziz Abdulla, Pavel Krcál, Wang Yi
ENTCS
2010
165views more  ENTCS 2010»
13 years 10 months ago
Correct Execution of Reconfiguration for Stateful Components
In component-based software engineering, reconfiguration describes structural changes to the architecture of a component system. For stateful components, not only structural but a...
Moritz Hammer, Alexander Knapp