Sciweavers

114 search results - page 21 / 23
» Using Verification Technology to Specify and Detect Malware
Sort
View
BPM
2006
Springer
78views Business» more  BPM 2006»
13 years 9 months ago
Semantic Correctness in Adaptive Process Management Systems
Adaptivity in Process Management Systems (PMS) is key to their successful applicability in pratice. Approaches have already been developed to ensure the system correctness after ar...
Linh Thao Ly, Stefanie Rinderle, Peter Dadam
ERLANG
2008
ACM
13 years 7 months ago
Gradual typing of erlang programs: a wrangler experience
Currently most Erlang programs contain no or very little type information. This sometimes makes them unreliable, hard to use, and difficult to understand and maintain. In this pap...
Konstantinos F. Sagonas, Daniel Luna
ECOWS
2008
Springer
13 years 7 months ago
Beyond Soundness: On the Semantic Consistency of Executable Process Models
Executable business process models build on the specification of process activities, their implemented business functions (e.g., Web services) and the control flow between these a...
Ingo Weber, Jörg Hoffmann, Jan Mendling
WWW
2007
ACM
14 years 6 months ago
A fault model and mutation testing of access control policies
To increase confidence in the correctness of specified policies, policy developers can conduct policy testing by supplying typical test inputs (requests) and subsequently checking...
Evan Martin, Tao Xie
EMSOFT
2005
Springer
13 years 11 months ago
Passive mid-stream monitoring of real-time properties
Passive monitoring or testing of complex systems and networks running in the field can provide valuable insights into their behavior in actual environments of use. In certain con...
Lalita Jategaonkar Jagadeesan, Ramesh Viswanathan