Sciweavers

454 search results - page 9 / 91
» Modeling and analysis of multi-agent systems using petri net...
Sort
View
SAFECOMP
1998
Springer
15 years 3 months ago
Safety Verification of Software Using Structured Petri Nets
A method is described for the analysis and the verification of safety in software systems. The method offers a formal notation for describing the software structure, the means for ...
Krzysztof Sacha
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
15 years 5 months ago
Using IDEF0/Petri Net for Ontology-Based Task Knowledge Analysis: The Case of Emergency Response for Debris-Flow
In terms of the progress of the industry, the velocity and dynamic nature of the global environment, has caused serious damage and diminished our earth’s resources. A lot of eff...
Wen-Yu Liu, Kwoting Fang
HICSS
1995
IEEE
110views Biometrics» more  HICSS 1995»
15 years 3 months ago
Reliability analysis of CSP specifications using Petri nets and Markov processes
In our research we are developing methodologiesand tools to permit stochastic analyses of CSP-based system specifications. In this regard, we have been developing morphismsbetween...
Krishna M. Kavi, Frederick T. Sheldon, Behrooz Shi...
TSE
1998
115views more  TSE 1998»
14 years 11 months ago
Integration and Analysis of Use Cases Using Modular Petri Nets in Requirements Engineering
—It is well known that requirements engineering plays a critical role in software quality. The use case approach is a requirements elicitation technique commonly used in industri...
Woo Jin Lee, Sung Deok Cha, Yong Rae Kwon
PNPM
1987
15 years 3 months ago
Stochastic Petri Net Analysis of a Replicated File System
We present a stochastic Petri net model of a replicated file system in a distributed environment where replicated files reside on different hosts and a voting algorithm is used to...
Joanne Bechta Dugan, Gianfranco Ciardo