Sciweavers

2137 search results - page 230 / 428
» Proving Abstract Non-interference
Sort
View
120
Voted
ECOOP
2008
Springer
15 years 5 months ago
On Validity of Program Transformations in the Java Memory Model
Abstract. We analyse the validity of several common program transformations in multi-threaded Java, as defined by the Java Memory Model (JMM) section of Chapter 17 of the Java Lang...
Jaroslav Sevcík, David Aspinall
142
Voted
FASE
2008
Springer
15 years 5 months ago
A Logic of Graph Constraints
Abstract. Graph constraints were introduced in the area of graph transformation, in connection with the notion of (negative) application conditions, as a form to limit the applicab...
Fernando Orejas, Hartmut Ehrig, Ulrike Prange
143
Voted
CRIWG
2010
15 years 5 months ago
Supporting Asynchronous Workspace Awareness by Visualizing the Story Evolution in Collaborative Storytelling
Abstract. Workspace awareness support is mandatory for group support systems. In this paper, we present a novel approach to asynchronous awareness by means of traceability support....
Jana Schumann, Tanja Buttler, Stephan Lukosch
118
Voted
BIS
2008
92views Business» more  BIS 2008»
15 years 5 months ago
Structural Detection of Deadlocks in Business Process Models
Abstract. A common task in business process modelling is the verification of process models regarding syntactical and structural errors. While the former might be checked with low ...
Ahmed Awad, Frank Puhlmann
127
Voted
DBSEC
2007
131views Database» more  DBSEC 2007»
15 years 5 months ago
Dynamic Event-Based Access Control as Term Rewriting
Abstract. Despite the widespread adoption of Role-based Access Control (RBAC) models, new access control models are required for new applications for which RBAC may not be especial...
Clara Bertolissi, Maribel Fernández, Steve ...