Sciweavers

1937 search results - page 103 / 388
» Starting B Specifications from Use Cases
Sort
View
SAFECOMP
2001
Springer
15 years 9 months ago
An Investigation on Mutation Strategies for Fault Injection into RDD-100 Models
This paper focuses on the development of a conceptual framework for integrating fault injection mechanisms into the RDD-100 tool2 to support the dependability analysis of computer...
Mohamed Kaâniche, Yannick Le Guédart,...
SIGSOFT
2010
ACM
15 years 2 months ago
Realizability analysis for message-based interactions using shared-state projections
The global interaction behavior in message-based systems can be specified as a finite-state machine defining acceptable sequences of messages exchanged by a group of peers. Realiz...
Sylvain Hallé, Tevfik Bultan
164
Voted
IJNSEC
2011
145views more  IJNSEC 2011»
14 years 11 months ago
Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points
In this paper, cyclic elliptic curves of the form y2 + xy = x3 + ax2 + b, a, b ∈ GF(2m ) with order M is considered in the design of a Symmetric Key Image Encryption Scheme with...
S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari...
SAC
2002
ACM
15 years 4 months ago
Dynamically generating web application fragments from page templates
Web-based applications are typically required to be highly customizable and configurable. New application requirements have to be introduced rapidly, often without stopping the ru...
Uwe Zdun
135
Voted
LREC
2010
160views Education» more  LREC 2010»
15 years 6 months ago
Extraction, Merging, and Monitoring of Company Data from Heterogeneous Sources
We describe the implementation of an enterprise monitoring system that builds on an ontology-based information extraction (OBIE) component applied to heterogeneous data sources. T...
Christian Federmann, Thierry Declerck