Sciweavers

1463 search results - page 269 / 293
» Model Checking Implicit-Invocation Systems
Sort
View
GIS
2005
ACM
16 years 2 months ago
Dimension-refined topological predicates
Topological predicates, as derived from the 9-intersection model, have been widely recognized in GIS, spatial database systems, and many other geo-related disciplines. They are ba...
Mark McKenney, Alejandro Pauly, Reasey Praing, Mar...
ICSE
2008
IEEE-ACM
16 years 2 months ago
Analyzing medical processes
This paper shows how software engineering technologies used to define and analyze complex software systems can also be effective in detecting defects in human-intensive processes ...
Bin Chen, George S. Avrunin, Elizabeth A. Henneman...
WWW
2003
ACM
16 years 1 months ago
On labeling schemes for the semantic web
This paper focuses on the optimization of the navigation through voluminous subsumption hierarchies of topics employed by Portal Catalogs like Netscape Open Directory (ODP). We ad...
Vassilis Christophides, Dimitris Plexousakis, Mich...
ICSE
2007
IEEE-ACM
16 years 1 months ago
Randomized Differential Testing as a Prelude to Formal Verification
Most flight software testing at the Jet Propulsion Laboratory relies on the use of hand-produced test scenarios and is executed on systems as similar as possible to actual mission...
Alex Groce, Gerard J. Holzmann, Rajeev Joshi
ICSE
2008
IEEE-ACM
16 years 1 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens