Sciweavers

1027 search results - page 77 / 206
» Callgraph properties of executables
Sort
View
108
Voted
BPSC
2009
184views Business» more  BPSC 2009»
15 years 1 months ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen
TCS
2008
15 years 21 days ago
GemCell: A generic platform for modeling multi-cellular biological systems
The mass and complexity of biological information requires computer-aided simulation and analysis to help scientists achieve understanding and guide experimentation. Although livi...
Hila Amir-Kroll, Avital Sadot, Irun R. Cohen, Davi...
113
Voted
TKDE
2010
189views more  TKDE 2010»
14 years 11 months ago
Projective Distribution of XQuery with Updates
—We investigate techniques to automatically decompose any XQuery query—including updating queries specified by the XQuery Update Facility (XQUF)—into subqueries, that can be ...
Ying Zhang, Nan Tang, Peter A. Boncz
190
Voted
ICDT
2009
ACM
143views Database» more  ICDT 2009»
16 years 1 months ago
Automatic construction of simple artifact-based business processes
Almost all medium- and large-scale businesses rely on electronic workflow systems to manage their business processes. A key challenge is to enable the easy re-use and modification...
Christian Fritz, Richard Hull, Jianwen Su
110
Voted
SIGSOFT
2007
ACM
16 years 1 months ago
Model checking service compositions under resource constraints
When enacting a web service orchestration defined using the Business Process Execution Language (BPEL) we observed various safety property violations. This surprised us considerab...
David S. Rosenblum, Howard Foster, Jeff Kramer, Je...