Sciweavers

47 search results - page 8 / 10
» Systematic Correct Construction of Self-stabilizing Systems:...
Sort
View
COMPSAC
2010
IEEE
13 years 4 months ago
Security in Context: Analysis and Refinement of Software Architectures
Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the secur...
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
MTA
2000
108views more  MTA 2000»
13 years 7 months ago
Towards A New Authoring Methodology for Large-Scale Hypermedia Applications
As the amount of information technology increases, managing information resources, so that the correct people can find the information easily, becomes a critical issue. Hypermedia...
Ian Heath, Gary Wills, Richard Crowder, Wendy Hall...
ICFEM
2004
Springer
14 years 26 days ago
Timed Patterns: TCOZ to Timed Automata
Abstract. The integrated logic-based modeling language, Timed Communicating Object Z (TCOZ), is well suited for presenting complete and coherent requirement models for complex real...
Jin Song Dong, Ping Hao, Shengchao Qin, Jun Sun 00...
DAGSTUHL
2003
13 years 9 months ago
Genetic Design: Amplifying Our Ability to Deal With Requirements Complexity
Individual functional requirements represent fragments of behavior, while a design that satisfies a set of functional requirements represents integrated behavior. This perspective ...
R. Geoff Dromey
AIIA
1991
Springer
13 years 11 months ago
Approximate Entailment
The use of approximation as a method for dealing with complex problems is a fundamental research issue in Knowledge Representation. Using approximation in symbolic AI is not strai...
Marco Cadoli, Marco Schaerf