The definition and management of access rules (e.g., to control the access to business documents and business functions) is an important task within any enterprise information sy...
Many safety- and security-critical systems are real-time systems and, as a result, tools and techniques for verifying real-time systems are extremely important. Simulation and test...
We introduce a new model for distributed algorithms designed for large scale systems that need a low-overhead solution to allow the processes to communicate with each other. We as...
In this paper, we propose the nevertrace claim, which is a new construct for specifying the correctness properties that either finite or infinite execution traces (i.e., sequence...
In the last years, distributed coordinator-free systems, e.g., peerto-peer systems (P2P systems), have attracted much interest among researchers and practitioners. In these system...