Sciweavers

637 search results - page 67 / 128
» Inconsistency-Tolerant Integrity Checking
Sort
View
169
Voted
SCESM
2006
ACM
269views Algorithms» more  SCESM 2006»
15 years 9 months ago
Inferring operational requirements from scenarios and goal models using inductive learning
Goal orientation is an increasingly recognised Requirements Engineering paradigm. However, integration of goal modelling with operational models remains an open area for which the...
Dalal Alrajeh, Alessandra Russo, Sebastián ...
133
Voted
ATVA
2005
Springer
131views Hardware» more  ATVA 2005»
15 years 9 months ago
An MTBDD-Based Implementation of Forward Reachability for Probabilistic Timed Automata
Multi-Terminal Binary Decision Diagrams (MTBDDs) have been successfully applied in symbolic model checking of probabilistic systems. In this paper we propose an encoding method for...
Fuzhi Wang, Marta Z. Kwiatkowska
116
Voted
APWEB
2004
Springer
15 years 9 months ago
Template-Based Runtime Invalidation for Database-Generated Web Contents
We propose a template-based runtime invalidation approach for maintaining cache consistency in database-generated web contents. In our approach, the invalidator sits between a web...
Chun Yi Choi, Qiong Luo
132
Voted
DBPL
2003
Springer
73views Database» more  DBPL 2003»
15 years 8 months ago
Updates and Incremental Validation of XML Documents
We consider the incremental validation of updates on XML documents. When a valid XML document (i.e., one satisfying some constraints) is updated, it has to be verified that the n...
Béatrice Bouchou, Mirian Halfeld Ferrari Al...
139
Voted
ISSTA
2000
ACM
15 years 8 months ago
Verisim: Formal analysis of network simulations
—Network protocols are often analyzed using simulations. We demonstrate how to extend such simulations to check propositions expressing safety properties of network event traces ...
Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim...