We show that characteristic formulae for nite-state systems up to bisimulationlike equivalences (e.g., strong and weak bisimilarity) can be given in the simple branching-time temp...
+ XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper resistant execution. XOM provides support for encryption/decryption and integrit...
Function Point Analysis measures user requested functionality independent of the technology used for implementation. Software applications are represented stract model that contai...
A primary goal of generative programming and model-driven ent is to raise the level of abstraction at which designers and developers interact with the software systems they are bui...
Many existing software applications involve complex application layer implemented in OO programming languages and at the same time use relational database systems as back-end data...