Sciweavers

66 search results - page 7 / 14
» Formal Modeling of C. elegans Development: A Scenario-Based ...
Sort
View
SIGSOFT
2007
ACM
15 years 10 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
WOSP
2004
ACM
15 years 3 months ago
Analysing UML 2.0 activity diagrams in the software performance engineering process
In this paper we present an original method of analysing the newlyrevised UML2.0 activity diagrams. Our analysis method builds on our formal interpretation of these diagrams with ...
C. Canevet, Stephen Gilmore, Jane Hillston, Le&ium...
ICCS
2003
Springer
15 years 2 months ago
Representing Time and Modality in Narratives with Conceptual Graphs
In this paper we investigate principles of the representation of time and modality in terms of conceptual graphs. Based on the works of A. N. Prior, and C. S. Peirce, we suggest a ...
Henrik Schärfe, Peter Øhrstrøm
IHI
2012
217views Healthcare» more  IHI 2012»
13 years 5 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...
75
Voted
DAC
2006
ACM
15 years 3 months ago
Use of C/C++ models for architecture exploration and verification of DSPs
Architectural decisions for DSP modules are often analyzed using high level C models. Such high-level explorations allow early examination of the algorithms and the architectural ...
David Brier, Raj S. Mitra