Sciweavers

357 search results - page 52 / 72
» Specifying and Verifying Fault-Tolerant Systems
Sort
View
EDBT
2008
ACM
120views Database» more  EDBT 2008»
14 years 7 months ago
Schema mapping verification: the spicy way
Schema mapping algorithms rely on value correspondences ? i.e., correspondences among semantically related attributes ? to produce complex transformations among data sources. Thes...
Angela Bonifati, Giansalvatore Mecca, Alessandro P...
DCOSS
2007
Springer
14 years 1 months ago
A Compilation Framework for Macroprogramming Networked Sensors
Macroprogramming—the technique of specifying the behavior of the system, as opposed to the constituent nodes—provides application developers with high level abstractions that a...
Animesh Pathak, Luca Mottola, Amol Bakshi, Viktor ...
MODELS
2007
Springer
14 years 1 months ago
Rigorously Defining and Analyzing Medical Processes: An Experience Report
Abstract. This paper describes our experiences in defining the processes associated with preparing and administrating chemotherapy and then using those process definitions as the b...
Stefan Christov, Bin Chen, George S. Avrunin, Lori...
SOFSEM
2007
Springer
14 years 1 months ago
Improved Processing of Textual Use Cases: Deriving Behavior Specifications
The requirements for a system are often specified as textual use cases. Although they are written in natural language, the simple and uniform sentence structure used makes automate...
Jaroslav Drazan, Vladimir Mencl
ICICS
2005
Springer
14 years 1 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...