Sciweavers

4286 search results - page 714 / 858
» Formalizing Service Interactions
Sort
View
140
Voted
ICSE
1999
IEEE-ACM
15 years 8 months ago
Exploiting ADLs to Specify Architectural Styles Induced by Middleware Infrastructures
Architecture Definition Languages (ADLs) enable the formalization of the architecture of software systems and the execution of preliminary analyses on them. These analyses aim at...
Elisabetta Di Nitto, David S. Rosenblum
149
Voted
ICECCS
1998
IEEE
161views Hardware» more  ICECCS 1998»
15 years 8 months ago
A Method and a Technique to Model and Ensure Timeliness in Safety Critical Real-Time Systems
The main focus of this paper is the problem of ensuring timeliness in safety critical systems. First, we introduce a method and its associated technique to model both real-time ta...
Christophe Aussaguès, Vincent David
126
Voted
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
15 years 8 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
133
Voted
ICSE
1998
IEEE-ACM
15 years 8 months ago
What You See Is What You Test: A Methodology for Testing Form-Based Visual Programs
Form-based visual programming languages, which include commercial spreadsheets and various research systems, have had a substantial impact on end-user computing. Research shows, h...
Gregg Rothermel, Lixin Li, Christopher DuPuis, Mar...
KDD
1998
ACM
94views Data Mining» more  KDD 1998»
15 years 8 months ago
Independence Diagrams: A Technique for Visual Data Mining
An important issue in data mining is the recognition of complex dependencies between attributes. Past techniques for identifying attribute dependence include correlation coefficie...
Stefan Berchtold, H. V. Jagadish, Kenneth A. Ross