Sciweavers

258 search results - page 6 / 52
» WofBPEL: A Tool for Automated Analysis of BPEL Processes
Sort
View
JLP
2008
75views more  JLP 2008»
13 years 7 months ago
Automated verification of selected equivalences for security protocols
In the analysis of security protocols, methods and tools for reasoning about protocol behaviors have been quite effective. We aim to expand the scope of those methods and tools. W...
Bruno Blanchet, Martín Abadi, Cédric...
XPU
2007
Springer
14 years 1 months ago
Predicting Software Defect Density: A Case Study on Automated Static Code Analysis
The number of defects is an important indicator of software quality. Agile software development methods put an explicit requirement on automation and permanently low defect rates. ...
Artem Marchenko, Pekka Abrahamsson
IJAOSE
2010
126views more  IJAOSE 2010»
13 years 4 months ago
Automated analysis of compositional multi-agent systems
An approach for handling the complex dynamics of a multi-agent system is based on distinguishing aggregation levels. The behaviour at a given aggregation level is specified by a se...
Alexei Sharpanskykh, Jan Treur
PPOPP
2006
ACM
14 years 1 months ago
On-line automated performance diagnosis on thousands of processes
Performance analysis tools are critical for the effective use of large parallel computing resources, but existing tools have failed to address three problems that limit their scal...
Philip C. Roth, Barton P. Miller
ISICT
2003
13 years 8 months ago
On the automated implementation of modal logics used to verify security protocols
: Formal verification provides a rigid and thorough means of evaluating the correctness of cryptographic protocols so that even subtle defects can be identified. As the application...
Tom Coffey, Reiner Dojen, Tomas Flanagan