Sciweavers

3507 search results - page 608 / 702
» Specialized execution environments
Sort
View
ASE
2008
102views more  ASE 2008»
13 years 10 months ago
Model driven code checking
Model checkers were originally developed to support the formal verification of high-level design models of distributed system designs. Over the years, they have become unmatched in...
Gerard J. Holzmann, Rajeev Joshi, Alex Groce
CONCURRENCY
2010
110views more  CONCURRENCY 2010»
13 years 10 months ago
Redesigning the message logging model for high performance
Over the past decade the number of processors in the high performance facilities went up to hundreds of thousands. As a direct consequence, while the computational power follow th...
Aurelien Bouteiller, George Bosilca, Jack Dongarra
DEBU
2008
104views more  DEBU 2008»
13 years 10 months ago
Process Mining in Web Services: The WebSphere Case
Process mining has emerged as a way to discover or check the conformance of processes based on event logs. This enables organizations to learn from processes as they really take p...
Wil M. P. van der Aalst, H. M. W. (Eric) Verbeek
FAC
2008
178views more  FAC 2008»
13 years 10 months ago
Modeling and validating Mondex scenarios described in UML and OCL with USE
This paper describes the Mondex case study with UML class diagrams and restricting OCL constraints. The constraints have been formulated either as OCL class invariants or as OCL pr...
Mirco Kuhlmann, Martin Gogolla
COMSIS
2006
141views more  COMSIS 2006»
13 years 10 months ago
Common Web Application Attack Types and Security Using ASP.NET
Web applications security is one of the most daunting tasks today, because of security shift from lower levels of ISO OSI model to application level, and because of current situati...
Bojan Jovicic, Dejan Simic