Sciweavers

44 search results - page 7 / 9
» Discovering Constraints for Inductive Process Modeling
Sort
View
TACAS
2010
Springer
160views Algorithms» more  TACAS 2010»
14 years 7 months ago
Efficient Detection of Errors in Java Components Using Random Environment and Restarts
Software model checkers are being used mostly to discover specific types of errors in the code, since exhaustive verification of complex programs is not possible due to state explo...
Pavel Parizek, Tomás Kalibera
ICDE
1996
IEEE
120views Database» more  ICDE 1996»
15 years 10 months ago
Towards the Reverse Engineering of Denormalized Relational Databases
This paper describes a method to cope with denormalized relational schemas in a database reverse engineering process. We propose two main steps to irnprove the understanding of da...
Jean-Marc Petit, Farouk Toumani, Jean-Franç...
70
Voted
MODELS
2007
Springer
15 years 3 months ago
UML2Alloy: A Challenging Model Transformation
Abstract. Alloy is a formal language, which has been applied to modelling of systems in a wide range of application domains. It is supported by Alloy Analyzer, a tool, which allows...
Kyriakos Anastasakis, Behzad Bordbar, Geri Georg, ...
IJSN
2006
87views more  IJSN 2006»
14 years 9 months ago
Workflow authorisation in mediator-free environments
: WorkFlow Management Systems (WFMS) coordinate and streamline business processes. Acquiring workflow authorisations and managing workflow authorisation constraints is achallenging...
Mohamed Shehab, Elisa Bertino, Arif Ghafoor
ICIP
2007
IEEE
15 years 11 months ago
Mining Auxiliary Objects for Tracking by Multibody Grouping
On-line discovery of some auxiliary objects to verify the tracking results is a novel approach to achieving robust tracking by balancing the need for strong verification and compu...
Ming Yang, Ying Wu, Shihong Lao