Sciweavers

2467 search results - page 430 / 494
» Finite State Machines
Sort
View
COMPSAC
2005
IEEE
15 years 3 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine
EUROMICRO
2005
IEEE
15 years 3 months ago
The Audition Framework for Testing Web Services Interoperability
Service Oriented Architectures and Web Services are emerging technologies, which have overall inherited problems and advantages from the component-based approach, but exacerbated ...
Antonia Bertolino, Andrea Polini
AISADM
2005
Springer
15 years 3 months ago
Querying Dynamic and Context-Sensitive Metadata in Semantic Web
RDF (core Semantic Web standard) is not originally appropriate for context representation, because of its initial focus on the ordinary Web resources, such as web pages, files, dat...
Sergiy Nikitin, Vagan Y. Terziyan, Yaroslav Tsaruk...
ATVA
2005
Springer
132views Hardware» more  ATVA 2005»
15 years 3 months ago
Flat Counter Automata Almost Everywhere!
Abstract. This paper argues that flatness appears as a central notion in the verification of counter automata. A counter automaton is called flat when its control graph can be ...
Jérôme Leroux, Grégoire Sutre
ECMDAFA
2005
Springer
122views Hardware» more  ECMDAFA 2005»
15 years 3 months ago
Semantic Anchoring with Model Transformations
Model-Integrated Computing (MIC) is an approach to Model-Driven Architecture (MDA), which has been developed primarily for embedded systems. MIC places strong emphasis on the use o...
Kai Chen 0003, Janos Sztipanovits, Sherif Abdelwah...