Sciweavers

44 search results - page 7 / 9
» Discovering Constraints for Inductive Process Modeling
Sort
View
96
Voted
TACAS
2010
Springer
160views Algorithms» more  TACAS 2010»
14 years 10 months ago
Efficient Detection of Errors in Java Components Using Random Environment and Restarts
Software model checkers are being used mostly to discover specific types of errors in the code, since exhaustive verification of complex programs is not possible due to state explo...
Pavel Parizek, Tomás Kalibera
209
Voted
ICDE
1996
IEEE
120views Database» more  ICDE 1996»
16 years 1 months ago
Towards the Reverse Engineering of Denormalized Relational Databases
This paper describes a method to cope with denormalized relational schemas in a database reverse engineering process. We propose two main steps to irnprove the understanding of da...
Jean-Marc Petit, Farouk Toumani, Jean-Franç...
87
Voted
MODELS
2007
Springer
15 years 6 months ago
UML2Alloy: A Challenging Model Transformation
Abstract. Alloy is a formal language, which has been applied to modelling of systems in a wide range of application domains. It is supported by Alloy Analyzer, a tool, which allows...
Kyriakos Anastasakis, Behzad Bordbar, Geri Georg, ...
71
Voted
IJSN
2006
87views more  IJSN 2006»
15 years 12 days ago
Workflow authorisation in mediator-free environments
: WorkFlow Management Systems (WFMS) coordinate and streamline business processes. Acquiring workflow authorisations and managing workflow authorisation constraints is achallenging...
Mohamed Shehab, Elisa Bertino, Arif Ghafoor
ICIP
2007
IEEE
16 years 2 months ago
Mining Auxiliary Objects for Tracking by Multibody Grouping
On-line discovery of some auxiliary objects to verify the tracking results is a novel approach to achieving robust tracking by balancing the need for strong verification and compu...
Ming Yang, Ying Wu, Shihong Lao