Modern multi-core microprocessors implement weak memory consistency models; programming for these architectures is a challenge. This paper solves a problem open for ten years, and ...
Jade Alglave, Daniel Kroening, John Lugton, Vincen...
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Experience has shown that prototypingis a valuabletechnique in the validation of designs. However, the prototype(s) can be too far semantically removed from the design. Animation ...
Future Interval Logic (FIL) and its intuitive graphical representation, Graphical Interval Logic (GIL), can be used as the formal description language of model checking tools to v...
We investigate the concept of norm compliance in business process modeling. In particular we propose an extension of Formal Contract Logic (FCL), a combination of defeasible logic ...