Sciweavers

2558 search results - page 207 / 512
» Model Composition Contracts
Sort
View
ICSE
2009
IEEE-ACM
15 years 2 months ago
Slede: Framework for automatic verification of sensor network security protocol implementations
Verifying security properties of protocols requires developers to manually create protocol-specific intruder models, which could be tedious and error prone. We present Slede, a ve...
Youssef Hanna, Hridesh Rajan
WSFM
2007
Springer
15 years 11 months ago
From BPEL to SRML: A Formal Transformational Approach
The SENSORIA Reference Modelling Language (SRML) provides primitives for modelling business processes in a technology agnostic way. At the core of SRML is the notion of module as a...
Laura Bocchi, Yi Hong, Antónia Lopes, Jos&e...
PODS
2004
ACM
158views Database» more  PODS 2004»
16 years 5 months ago
Composing Schema Mappings: Second-Order Dependencies to the Rescue
A schema mapping is a specification that describes how data structured under one schema (the source schema) is to be transformed into data structured under a different schema (the...
Ronald Fagin, Phokion G. Kolaitis, Lucian Popa, Wa...
VMCAI
2009
Springer
15 years 11 months ago
Towards Automatic Stability Analysis for Rely-Guarantee Proofs
The Rely-Guarantee approach is a well-known compositional method for proving Hoare logic properties of concurrent programs. In this approach, predicates in the proof must be proved...
Hasan Amjad, Richard Bornat
EDOC
2008
IEEE
15 years 11 months ago
Achieving Business Process Flexibility with Business Rules
Business processes used in networked business are often large and complex, which makes them difficult to manage and change. In this paper we address this lack of flexibility by pr...
Tim van Eijndhoven, Maria-Eugenia Iacob, Mar&iacut...