Sciweavers

1121 search results - page 108 / 225
» Building Formal Requirements Models for Reliable Software
Sort
View
DBPL
1989
Springer
165views Database» more  DBPL 1989»
15 years 8 months ago
Support for Data-Intensive Applications: Conceptual Design and Software Development
In the process of developing an Information System, one passes through stages that include requirements gathering, design specification, and software implementation. The purpose ...
Alexander Borgida, John Mylopoulos, Joachim W. Sch...
124
Voted
ACSD
2001
IEEE
74views Hardware» more  ACSD 2001»
15 years 7 months ago
From Code to Models
One of the corner stones of formal methods is the notion traction enables analysis. By the construction of act model we can trade implementation detail for analytical power. The i...
Gerard J. Holzmann
132
Voted
AICCSA
2006
IEEE
137views Hardware» more  AICCSA 2006»
15 years 10 months ago
Modeling Redundancy: Quantitative and Qualitative Models
Redundancy is a system property that generally refers to duplication of state information or system function. While redundancy is usually investigated in the context of fault tole...
Ali Mili, Lan Wu, Frederick T. Sheldon, Mark Shere...
147
Voted
JAIR
2002
120views more  JAIR 2002»
15 years 3 months ago
Learning Geometrically-Constrained Hidden Markov Models for Robot Navigation: Bridging the Topological-Geometrical Gap
Hidden Markov models hmms and partially observable Markov decision processes pomdps provide useful tools for modeling dynamical systems. They are particularly useful for represent...
Hagit Shatkay, Leslie Pack Kaelbling
138
Voted
IFIP
2009
Springer
15 years 1 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta