Sciweavers

486 search results - page 64 / 98
» Sound Methods and Effective Tools for Engineering Modeling a...
Sort
View
CN
1998
119views more  CN 1998»
13 years 8 months ago
The Order of Things: Activity-Centred Information Access,
This paper focuses on the representation and access of Web-based information, and how to make such a representation adapt to the activities or interests of individuals within a co...
Matthew Chalmers, Kerry Rodden, Dominique Brodbeck
CCS
2008
ACM
13 years 10 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
ER
2005
Springer
200views Database» more  ER 2005»
14 years 2 months ago
How to Tame a Very Large ER Diagram (Using Link Analysis and Force-Directed Drawing Algorithms)
Abstract. Understanding a large schema without the assistance of persons already familiar with it (and its associated applications), is a hard and very time consuming task that occ...
Yannis Tzitzikas, Jean-Luc Hainaut
ICSE
2010
IEEE-ACM
13 years 10 months ago
Supporting developers with natural language queries
The feature list of modern IDEs is steadily growing and mastering these tools becomes more and more demanding, especially for novice programmers. Despite their remarkable capabili...
Michael Würsch, Giacomo Ghezzi, Gerald Reif, ...
SIMUTOOLS
2008
13 years 10 months ago
Transforming sources to petri nets: a way to analyze execution of parallel programs
Model checking is a suitable formal technique to analyze parallel programs' execution in an industrial context because automated tools can be designed and operated with very ...
Jean-Baptiste Voron, Fabrice Kordon