Sciweavers

3082 search results - page 37 / 617
» Deviation Analysis: A New Use of Model Checking
Sort
View
CPM
2006
Springer
125views Combinatorics» more  CPM 2006»
15 years 9 months ago
Geometric Suffix Tree: A New Index Structure for Protein 3-D Structures
Abstract. Protein structure analysis is one of the most important research issues in the post-genomic era, and faster and more accurate query data structures for such 3-D structure...
Tetsuo Shibuya
SPIN
1999
Springer
15 years 9 months ago
Model Checking for Managers
Model checking is traditionally applied to computer system design. It has proven to be a valuable technique. However, it requires detailed specifications of systems and requirement...
Wil Janssen, Radu Mateescu, Sjouke Mauw, Peter Fen...
DSN
2006
IEEE
15 years 11 months ago
Dynamic Verification of Memory Consistency in Cache-Coherent Multithreaded Computer Architectures
—Multithreaded servers with cache-coherent shared memory are the dominant type of machines used to run critical network services and database management systems. To achieve the h...
Albert Meixner, Daniel J. Sorin
JCS
2002
94views more  JCS 2002»
15 years 5 months ago
Model-Based Analysis of Configuration Vulnerabilities
Vulnerability analysis is concerned with the problem of identifying weaknesses in computer systems that can be exploited to compromise their security. In this paper we describe a ...
C. R. Ramakrishnan, R. C. Sekar
BPM
2009
Springer
146views Business» more  BPM 2009»
15 years 12 months ago
Instantaneous Soundness Checking of Industrial Business Process Models
We report on a case study on control-flow analysis of business process models. We checked 735 industrial business process models from financial services, telecommunications and o...
Dirk Fahland, Cédric Favre, Barbara Jobstma...