Sciweavers

2004 search results - page 309 / 401
» Comparison of Model Checking Tools for Information Systems
Sort
View
SOFTVIS
2006
ACM
15 years 5 months ago
Using social agents to visualize software scenarios
Enabling nonexperts to understand a software system and the scenarios of usage of that system can be challenging. Visually modeling a collection of scenarios as social interaction...
Thomas A. Alspaugh, Bill Tomlinson, Eric Baumer
ICCAD
1994
IEEE
144views Hardware» more  ICCAD 1994»
15 years 4 months ago
Power analysis of embedded software: a first step towards software power minimization
Embedded computer systems are characterized by the presence of a dedicated processor and the software that runs on it. Power constraints are increasingly becoming the critical com...
Vivek Tiwari, Sharad Malik, Andrew Wolfe
ICEIS
2007
IEEE
15 years 6 months ago
Challenges in Business Process Analysis
Business process analysis ranges from model verification at design-time to the monitoring of processes at run-time. Much progress has been achieved in process verification. Today...
Wil M. P. van der Aalst
CCS
2007
ACM
15 years 6 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
ER
2004
Springer
79views Database» more  ER 2004»
15 years 5 months ago
Multi-phase Process Mining: Building Instance Graphs
Abstract. Deploying process-driven information systems is a time-consuming and error-prone task. Process mining attempts to improve this by automatically generating a process model...
Boudewijn F. van Dongen, Wil M. P. van der Aalst