Sciweavers

3555 search results - page 497 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
WWW
2006
ACM
16 years 6 months ago
Capturing RIA concepts in a web modeling language
This work addresses conceptual modeling and automatic code generation for Rich Internet Applications, a variant of Web-based systems bridging the gap between desktop and Web inter...
Alessandro Bozzon, Sara Comai, Piero Fraternali, G...
CAV
2009
Springer
119views Hardware» more  CAV 2009»
16 years 6 months ago
HybridFluctuat: A Static Analyzer of Numerical Programs within a Continuous Environment
A new static analyzer is described, based on the analyzer Fluctuat. Its goal is to synthetize invariants for hybrid systems, encompassing a continuous environment described by a sy...
Eric Goubault, Franck Védrine, Karim Tekkal...
ASP
2005
Springer
15 years 11 months ago
An Experimental Study of Search Strategies and Heuristics in Answer Set Programming
Answer Set Programming (ASP) and propositional satisfiability (SAT) are closely related. In some recent work we have shown that, on a wide set of logic programs called “tight”...
Enrico Giunchiglia, Marco Maratea
BIRTHDAY
2005
Springer
15 years 11 months ago
Graph Transformation with Variables
Abstract. Variables make rule-based systems more abstract and expressive, as witnessed by term rewriting systems and two-level grammars. In this paper we show that variables can be...
Berthold Hoffmann
TACAS
2004
Springer
135views Algorithms» more  TACAS 2004»
15 years 10 months ago
Liveness with Incomprehensible Ranking
Abstract. The methods of Invisible Invariants and Invisible Ranking were developed originally in order to verify temporal properties of parameterized systems in a fully automatic m...
Yi Fang, Nir Piterman, Amir Pnueli, Lenore D. Zuck