Sciweavers

4341 search results - page 260 / 869
» Quantitative Model checking
Sort
View
ESORICS
2006
Springer
15 years 4 months ago
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System
The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to over...
Hai Wang, Peng Liu
107
Voted
ENTCS
2010
118views more  ENTCS 2010»
14 years 10 months ago
Fragments-based Model Reduction: Some Case Studies
Molecular biological models usually suffer from a dramatic combinatorial blow up. Indeed, proteins form complexes and can modify each others, which leads to the formation of a hug...
Jérôme Feret
106
Voted
CIMAGING
2008
122views Hardware» more  CIMAGING 2008»
15 years 2 months ago
Online consistency checking for AM-FM target tracks
We compute AM-FM models for infrared video frames depicting military targets immersed in structured clutter backgrounds. We show that independent correlation based detection proce...
Nick A. Mould, Chuong T. Nguyen, Colin M. Johnston...
OTM
2010
Springer
14 years 11 months ago
Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context
In this paper, we present generic algorithms to ensure the consistency of mutual-exclusion and binding constraints in a business process context. We repeatedly identified the need...
Mark Strembeck, Jan Mendling
112
Voted
ATAL
2008
Springer
15 years 2 months ago
Checking correctness of business contracts via commitments
Business contracts tend to be complex. In current practice, contracts are often designed by hand and adopted by their participants after, at best, a manual analysis. This paper mo...
Nirmit Desai, Nanjangud C. Narendra, Munindar P. S...