Sciweavers

141 search results - page 17 / 29
» Transforming OCL constraints: a context change approach
Sort
View
FIW
1998
130views Communications» more  FIW 1998»
13 years 9 months ago
A Heuristic Approach to Detect Feature Interactions in Requirements
We present a method to systematically detect feature interactions in requirements, which are expressed as constraints on system event traces. We show its application on the lift sy...
Maritta Heisel, Jeanine Souquières
FLAIRS
2008
13 years 10 months ago
Recovering from Inconsistency in Distributed Simple Temporal Networks
Simple Temporal Networks (STNs) are frequently used in scheduling applications, as they provide a powerful and general tool for managing temporal constraints. One obstacle to thei...
Anthony Gallagher, Stephen F. Smith
INFOCOM
2010
IEEE
13 years 7 months ago
A Systematic Approach for Evolving VLAN Designs
—Enterprise networks are large and complex, and their designs must be frequently altered to adapt to changing organizational needs. The process of redesigning and reconfiguring ...
Xin Sun, Yu-Wei Eric Sung, Sunil Krothapalli, Sanj...
BPM
2006
Springer
78views Business» more  BPM 2006»
14 years 5 days ago
Semantic Correctness in Adaptive Process Management Systems
Adaptivity in Process Management Systems (PMS) is key to their successful applicability in pratice. Approaches have already been developed to ensure the system correctness after ar...
Linh Thao Ly, Stefanie Rinderle, Peter Dadam
IWSEC
2009
Springer
14 years 3 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...