Sciweavers

185 search results - page 26 / 37
» SOFL: A Formal Engineering Methodology for Industrial Applic...
Sort
View
ICSE
2008
IEEE-ACM
15 years 12 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
FASE
2005
Springer
15 years 5 months ago
Analyzing Web Service Based Business Processes
This paper is concerned with the application of Web services to distributed, cross-organizational business processes. In this scenario, it is crucial to answer the following questi...
Axel Martens
DEXAW
2004
IEEE
109views Database» more  DEXAW 2004»
15 years 3 months ago
Internet, GRID, Self-Adaptability and Beyond: Are We Ready?
This paper reflects different understanding and positions on future trends of GRID-oriented technologies, applications, and networks, as perceived by representatives from industry...
Petre Dini, Wolfgang Gentzsch, Mark Potts, Alexand...
RE
2007
Springer
15 years 5 months ago
Goal-Oriented Conceptual Database Design
We present details of a goal-oriented process for database requirements analysis. This process consists of a number of steps, spanning the spectrum from high-level stakeholder goa...
Lei Jiang, Thodoros Topaloglou, Alexander Borgida,...
CODES
2004
IEEE
15 years 3 months ago
Analytical models for leakage power estimation of memory array structures
There is a growing need for accurate power models at the system level. Memory structures such as caches, Branch Target Buffers (BTBs), and register files occupy significant area i...
Mahesh Mamidipaka, Kamal S. Khouri, Nikil D. Dutt,...