Sciweavers

3909 search results - page 254 / 782
» Extreme Model Checking
Sort
View
140
Voted
ISDA
2009
IEEE
15 years 10 months ago
From Local Patterns to Global Models: Towards Domain Driven Educational Process Mining
Educational process mining (EPM) aims at (i) constructing complete and compact educational process models that are able to reproduce all observed behavior (process model discovery...
Nikola Trcka, Mykola Pechenizkiy
IWFM
2000
107views Formal Methods» more  IWFM 2000»
15 years 4 months ago
A Comparison of Three Model Checkers Applied to a Distributed Database Problem
ct Increasingly, model checking is being applied to more abstract problem domains than the traditional protocol analysis. The extent to which such an approach is able to provide us...
A. J. Currie
KBSE
2008
IEEE
15 years 9 months ago
Unit Testing of Flash Memory Device Driver through a SAT-Based Model Checker
Flash memory has become virtually indispensable in most mobile devices. In order for mobile devices to successfully provide services to users, it is essential that flash memory b...
Moonzoo Kim, Yunho Kim, Hotae Kim
SP
2006
IEEE
177views Security Privacy» more  SP 2006»
15 years 9 months ago
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis
Security concerns are becoming increasingly critical in networked systems. Firewalls provide important defense for network security. However, misconfigurations in firewalls are ...
Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, C...
GG
2008
Springer
15 years 4 months ago
Behavior Preservation in Model Refactoring Using DPO Transformations with Borrowed Contexts
Behavior preservation, namely the fact that the behavior of a model is not altered by the transformations, is a crucial property in refactoring. The most common approaches to behav...
Guilherme Rangel, Leen Lambers, Barbara König...