Sciweavers

4209 search results - page 536 / 842
» Abstract Dialectical Frameworks
Sort
View
ECEASST
2008
60views more  ECEASST 2008»
15 years 4 months ago
Sufficient Criteria for Applicability and Non-Applicability of Rule Sequences
Abstract: In several rule-based applications using graph transformation as underlying modeling technique the following questions arise: How can one be sure that a specific sequence...
Leen Lambers, Hartmut Ehrig, Gabriele Taentzer
194
Voted
ENTCS
2008
140views more  ENTCS 2008»
15 years 4 months ago
Fusing a Transformation Language with an Open Compiler
Transformation systems such as Stratego/XT provide powerful analysis and transformation frameworks and concise languages for language processing, but instantiating them for every ...
Karl Trygve Kalleberg, Eelco Visser
FUIN
2008
72views more  FUIN 2008»
15 years 4 months ago
Working with the Past: Integrating History in Petri Nets
Abstract. Most information systems that are driven by process models (e.g., workflow management systems) record events in event logs, also known as transaction logs or audit trails...
Kees M. van Hee, Alexander Serebrenik, Natalia Sid...
CORR
2006
Springer
133views Education» more  CORR 2006»
15 years 4 months ago
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements
Abstract. In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requiremen...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck
CORR
2006
Springer
105views Education» more  CORR 2006»
15 years 4 months ago
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of know...
Emina Torlak, Marten van Dijk, Blaise Gassend, Dan...