Sciweavers

637 search results - page 48 / 128
» Inconsistency-Tolerant Integrity Checking
Sort
View
133
Voted
EDOC
2004
IEEE
15 years 7 months ago
A Framework for Integrating Business Processes and Business Requirements
Service-oriented architectures and Web service infrastructure provide the ideal framework for interconnecting organizations and for defining distributed business applications. The...
Raman Kazhamiakin, Marco Pistore, Marco Roveri
127
Voted
BDA
2006
15 years 5 months ago
Integrating Correction into Incremental Validation
Many data on the Web are XML documents. An XML document is an unranked labelled tree. A schema for XML documents (for instance a DTD) is the specification of their internal structu...
Béatrice Bouchou, Ahmed Cheriat, Mirian Hal...
131
Voted
SBACPAD
2007
IEEE
143views Hardware» more  SBACPAD 2007»
15 years 9 months ago
A Code Compression Method to Cope with Security Hardware Overheads
Code Compression has been used to alleviate the memory requirements as well as to improve performance and/or minimize energy consumption. On the other hand, implementing security ...
Eduardo Wanderley Netto, Romain Vaslin, Guy Gognia...
129
Voted
CAISE
2006
Springer
15 years 5 months ago
Incremental Evaluation of OCL Constraints
: Integrity checking is aimed at determining whether an operation execution violates a given integrity constraint. To perform this computation efficiently, several incremental meth...
Jordi Cabot, Ernest Teniente
152
Voted
DATE
2009
IEEE
90views Hardware» more  DATE 2009»
15 years 10 months ago
Property analysis and design understanding
—Verification is a major issue in circuit and system design. Formal methods like bounded model checking (BMC) can guarantee a high quality of the verification. There are severa...
Ulrich Kühne, Daniel Große, Rolf Drechs...