Sciweavers

2702 search results - page 313 / 541
» Practically Applicable Formal Methods
Sort
View
ICSE
2008
IEEE-ACM
16 years 2 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
HICSS
2008
IEEE
130views Biometrics» more  HICSS 2008»
15 years 9 months ago
Enterprise Modeling for Information System Development within MDA
Object-oriented analysis suggests semiformal usecase driven techniques for problem domain modeling from a computation independent viewpoint. The proposed approach called Topologic...
Janis Osis, Erika Asnina
100
Voted
CEC
2007
IEEE
15 years 9 months ago
An experimental study of the emergent behaviors of self-organized agent communities
—Emergent behavior is an essential feature in multi-agent systems and plays a significant role in the applications of agent technology. Because of the huge gap between individual...
Shufeng Wang, Hong Zhu
123
Voted
AGTIVE
2007
Springer
15 years 9 months ago
A First Experimental Evaluation of Search Plan Driven Graph Pattern Matching
Abstract. With graph pattern matching the field of graph transformation (GT) includes an NP-complete subtask. But for real-life applications it is essential that graph pattern mat...
Gernot Veit Batz, Moritz Kroll, Rubino Geiß
112
Voted
FASE
2007
Springer
15 years 9 months ago
Flexible and Extensible Notations for Modeling Languages
Abstract. In model-based development, a formal description of the software (the model) is the central artifact that drives other development activities. The availability of a model...
Jimin Gao, Mats Per Erik Heimdahl, Eric Van Wyk