Sciweavers

644 search results - page 92 / 129
» Translation the Wiki way
Sort
View
TACAS
2005
Springer
88views Algorithms» more  TACAS 2005»
14 years 1 months ago
Shortest Counterexamples for Symbolic Model Checking of LTL with Past
Shorter counterexamples are typically easier to understand. The length of a counterexample, as reported by a model checker, depends on both the algorithm used for state space explo...
Viktor Schuppan, Armin Biere
SBCCI
2004
ACM
127views VLSI» more  SBCCI 2004»
14 years 1 months ago
A formal software synthesis approach for embedded hard real-time systems
Software synthesis is defined as the task of translating a specification into a software program, in a general purpose language, in such a way that this software can be compiled...
Raimundo S. Barreto, Marília Neves, Meuse N...
APN
2004
Springer
14 years 1 months ago
EMiT: A Process Mining Tool
Process mining offers a way to distill process models from event logs originating from transactional systems in logistics, banking, e-business, health-care, etc. The algorithms us...
Boudewijn F. van Dongen, Wil M. P. van der Aalst
CAISE
2004
Springer
14 years 1 months ago
Object-Process Methodology (OPM) vs. UML - a Code Generation Perspective
Modeling languages have been evolving at a high pace, encouraging the use of automatic code generators for transforming models to programs. Automatic code generators should enable ...
Iris Reinhartz-Berger, Dov Dori
CARDIS
2004
Springer
150views Hardware» more  CARDIS 2004»
14 years 1 months ago
Enforcing High-Level Security Properties for Applets
Smart card applications often handle privacy-sensitive information, and therefore must obey certain security policies. Typically, such policies are described as high-level security...
Mariela Pavlova, Gilles Barthe, Lilian Burdy, Mari...