Sciweavers

454 search results - page 9 / 91
» Modeling and analysis of multi-agent systems using petri net...
Sort
View
SAFECOMP
1998
Springer
15 years 1 months ago
Safety Verification of Software Using Structured Petri Nets
A method is described for the analysis and the verification of safety in software systems. The method offers a formal notation for describing the software structure, the means for ...
Krzysztof Sacha
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
15 years 3 months ago
Using IDEF0/Petri Net for Ontology-Based Task Knowledge Analysis: The Case of Emergency Response for Debris-Flow
In terms of the progress of the industry, the velocity and dynamic nature of the global environment, has caused serious damage and diminished our earth’s resources. A lot of eff...
Wen-Yu Liu, Kwoting Fang
HICSS
1995
IEEE
110views Biometrics» more  HICSS 1995»
15 years 1 months ago
Reliability analysis of CSP specifications using Petri nets and Markov processes
In our research we are developing methodologiesand tools to permit stochastic analyses of CSP-based system specifications. In this regard, we have been developing morphismsbetween...
Krishna M. Kavi, Frederick T. Sheldon, Behrooz Shi...
TSE
1998
115views more  TSE 1998»
14 years 9 months ago
Integration and Analysis of Use Cases Using Modular Petri Nets in Requirements Engineering
—It is well known that requirements engineering plays a critical role in software quality. The use case approach is a requirements elicitation technique commonly used in industri...
Woo Jin Lee, Sung Deok Cha, Yong Rae Kwon
PNPM
1987
15 years 28 days ago
Stochastic Petri Net Analysis of a Replicated File System
We present a stochastic Petri net model of a replicated file system in a distributed environment where replicated files reside on different hosts and a voting algorithm is used to...
Joanne Bechta Dugan, Gianfranco Ciardo