Sciweavers

137 search results - page 24 / 28
» Requirements engineering for trust management: model, method...
Sort
View
DESRIST
2009
Springer
137views Education» more  DESRIST 2009»
15 years 4 months ago
Coordination analysis: a method for deriving use cases from process dependencies
Despite the widespread recognition that information technology (IT) and business process are tightly connected, existing system design methods provide limited guidance on how to t...
Xiang Michelle Liu, George M. Wyner
96
Voted
VLSID
2003
IEEE
180views VLSI» more  VLSID 2003»
16 years 22 hour ago
Automating Formal Modular Verification of Asynchronous Real-Time Embedded Systems
Most verification tools and methodologies such as model checking, equivalence checking, hardware verification, software verification, and hardware-software coverification often fl...
Pao-Ann Hsiung, Shu-Yu Cheng
ICSE
2000
IEEE-ACM
15 years 3 months ago
An inheritance-based technique for building simulation proofs incrementally
This paper presents a technique for incrementally constructing safety specifications, abstract algorithm descriptions, and simulation proofs showing that algorithms meet their spe...
Idit Keidar, Roger Khazan, Nancy A. Lynch, Alexand...
103
Voted
EMSOFT
2005
Springer
15 years 5 months ago
Passive mid-stream monitoring of real-time properties
Passive monitoring or testing of complex systems and networks running in the field can provide valuable insights into their behavior in actual environments of use. In certain con...
Lalita Jategaonkar Jagadeesan, Ramesh Viswanathan
99
Voted
LOGCOM
2010
128views more  LOGCOM 2010»
14 years 10 months ago
Answer Set Programming with Resources
In this paper, we propose an extension of Answer Set Programming (ASP) to support declarative reasoning on consumption and production of resources. We call the proposed extension ...
Stefania Costantini, Andrea Formisano