Sciweavers

759 search results - page 49 / 152
» On formal models for social verification
Sort
View
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
15 years 4 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
GECCO
2007
Springer
142views Optimization» more  GECCO 2007»
15 years 6 months ago
Simulations of egoistic and altruistic behaviors using the vidya multiagent system platform
This paper investigates the impacts of individual egoistic and altruistic behaviors in a virtual society built upon the Vidya game, used here as the social simulation and Multiage...
Marcelo Souza Pita, Fernando Buarque de Lima Neto
CADE
2008
Springer
16 years 4 days ago
Exploring Model-Based Development for the Verification of Real-Time Java Code
Many safety- and security-critical systems are real-time systems and, as a result, tools and techniques for verifying real-time systems are extremely important. Simulation and test...
Niusha Hakimipour, Paul A. Strooper, Roger Duke
RTCSA
2008
IEEE
15 years 6 months ago
Verification of COMDES-II Systems Using UPPAAL with Model Transformation
COMDES-II is a component-based software framework intended for Model Integrated Computing (MIC) of embedded control systems with hard real-time constraints. We present a transforma...
Xu Ke, Paul Pettersson, Krzysztof Sierszecki, Chri...
CAISE
2006
Springer
15 years 3 months ago
A Method for Functional Alignment Verification in Hierarchical Enterprise Models
Enterprise modeling involves multiple domains of expertise: requirements engineering, business process modeling, IT development etc. Our experience has shown that hierarchical ente...
Irina Rychkova, Alain Wegmann