Sciweavers

302 search results - page 23 / 61
» An approach to synthesise safe systems
Sort
View
COMPSAC
2009
IEEE
15 years 5 months ago
A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services
—Recent advances in mobile handheld devices have facilitated the ubiquitous availability of location based services. Systems which provide location based services have always bee...
Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed, Moham...
108
Voted
SEFM
2005
IEEE
15 years 6 months ago
BRILLANT : An Open Source and XML-based platform for Rigourous Software Development
The need for the B method first appeared in industry, and several commercial tools have been developed to support this formalism. However, few of these tools allow reasoning on t...
Samuel Colin, Dorian Petit, Vincent Poirriez, J&ea...
ECMDAFA
2010
Springer
241views Hardware» more  ECMDAFA 2010»
15 years 5 months ago
Detecting Inconsistencies in Multi-View Models with Variability
Multi-View Modeling (MVM) is a common modeling practice that advocates the use of multiple, different and yet related models to represent the needs of diverse stakeholders. Of cruc...
Roberto Erick Lopez-Herrejon, Alexander Egyed
116
Voted
APN
2008
Springer
15 years 2 months ago
A Symbolic Algorithm for the Synthesis of Bounded Petri Nets
This paper presents an algorithm for the synthesis of bounded Petri nets from transition systems. A bounded Petri net is always provided in case it exists. Otherwise, the events ar...
Josep Carmona, Jordi Cortadella, Michael Kishinevs...
POPL
1991
ACM
15 years 3 months ago
Polymorphic Type Inference and Assignment
We present a new approach to the polymorphic typing of data accepting in-place modification in ML-like languages. This approach is based on restrictions over type generalization,...
Xavier Leroy, Pierre Weis