Sciweavers

326 search results - page 23 / 66
» Tailoring and Verifying Software Process
Sort
View
BPM
2008
Springer
125views Business» more  BPM 2008»
13 years 10 months ago
Checking Compliance of Execution Traces to Business Rules
Complex and flexible business processes are critical not only because they are difficult to handle, but also because they often tend to loose their intelligibility. Verifying compl...
Federico Chesani, Paola Mello, Marco Montali, Fabr...
WSC
1997
13 years 9 months ago
MedModel - Healthcare Simulation Software
In response to the expressed needs of MedModel users, PROMODEL Corporation has made substantial improvements in its MedModel healthcare simulation software. Beginning with its inc...
Steve H. Denney
RV
2010
Springer
153views Hardware» more  RV 2010»
13 years 6 months ago
Run-Time Verification of Networked Software
Most applications that are in use today inter-operate with other applications, so-called peers, over a network. The analysis of such distributed applications requires that the effe...
Cyrille Valentin Artho
IPPS
2006
IEEE
14 years 2 months ago
Monitoring remotely executing shared memory programs in software DSMs
Peer-to-Peer (P2P) cycle sharing over the Internet has become increasingly popular as a way to share idle cycles. A fundamental problem faced by P2P cycle sharing systems is how t...
Long Fei, Xing Fang, Y. Charlie Hu, Samuel P. Midk...
DBSEC
2006
115views Database» more  DBSEC 2006»
13 years 10 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera