Sciweavers

677 search results - page 108 / 136
» Rigorous Object-Oriented Analysis
Sort
View
CSFW
2010
IEEE
14 years 11 days ago
Robustness Guarantees for Anonymity
—Anonymous communication protocols must achieve two seemingly contradictory goals: privacy (informally, they must guarantee the anonymity of the parties that send/receive informa...
Gilles Barthe, Alejandro Hevia, Zhengqin Luo, Tama...
EUROMICRO
2009
IEEE
14 years 10 days ago
Formal Semantics of the ProCom Real-Time Component Model
ProCom is a new component model for real-time and embedded systems, targeting the domains of vehicular and telecommunication systems. In this paper, we describe how the architectur...
Aneta Vulgarakis, Jagadish Suryadevara, Jan Carlso...
FOAL
2009
ACM
14 years 10 days ago
Graph-based specification and simulation of featherweight Java with around advice
In this paper we specify an operational run-time semantics of Assignment Featherweight Java -- a minimal subset of Java with assignments -- with around advice, using graph transfo...
Tom Staijen, Arend Rensink
BPM
2004
Springer
148views Business» more  BPM 2004»
14 years 6 days ago
Interactive Workflow Mining
Many information systems log event data about executed tasks. Workflow mining is concerned with the derivation of a graphical workflow model out of this data. Experience from appl...
Markus Hammori, Joachim Herbst, Niko Kleiner
GECCO
2006
Springer
157views Optimization» more  GECCO 2006»
14 years 3 days ago
How randomized search heuristics find maximum cliques in planar graphs
Surprisingly, general search heuristics often solve combinatorial problems quite sufficiently, although they do not outperform specialized algorithms. Here, the behavior of simple...
Tobias Storch