Sciweavers

2000 search results - page 130 / 400
» Program Transformation and Proof Transformation
Sort
View
148
Voted
CSFW
1999
IEEE
15 years 7 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
150
Voted
SAC
2008
ACM
15 years 3 months ago
UML-based design test generation
In this paper we investigate and propose a fully automated technique to perform conformance checking of Java implementations against UML class diagrams. In our approach, we reused...
Waldemar Pires, João Brunet, Franklin Ramal...
107
Voted
ECOOP
2006
Springer
15 years 7 months ago
Modeling Runtime Behavior in Framework-Based Applications
Abstract. Our research group has analyzed many industrial, frameworkbased applications. In these applications, simple functionality often requires excessive runtime activity. It is...
Nick Mitchell, Gary Sevitsky, Harini Srinivasan
98
Voted
FMOODS
2006
15 years 4 months ago
KM3: A DSL for Metamodel Specification
Abstract. We consider in this paper that a DSL (Domain Specific Language) may be defined by a set of models. A typical DSL is the ATLAS Transformation Language (ATL). An ATL progra...
Frédéric Jouault, Jean Bézivi...
130
Voted
ECAI
2006
Springer
15 years 7 months ago
On the Existence of Answer Sets in Normal Extended Logic Programs
An often problematic feature in answer set programming is that a program does not always produce an answer set, even for programs which represent default information in a seemingl...
Martin Caminada, Chiaki Sakama