Sciweavers

3555 search results - page 550 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
126
Voted
EDOC
2007
IEEE
15 years 8 months ago
A Tool for Enterprise Architecture Analysis
Enterprise architecture advocates model-based decision-making on enterprise-wide information system issues. In order to provide decisionmaking support, enterprise architecture mode...
Pontus Johnson, Erik Johansson, Teodor Sommestad, ...
ESCIENCE
2007
IEEE
15 years 7 months ago
Taverna Workflows: Syntax and Semantics
This paper presents the formal syntax and the operational semantics of Taverna, a workflow management system with a large user base among the e-Science community. Such formal foun...
Daniele Turi, Paolo Missier, Carole A. Goble, Davi...
ICDCSW
2000
IEEE
15 years 7 months ago
Compositional Verification of a Third Generation Mobile Communication Protocol
Model-checking has turned out to be an efficient and relatively easy-to-use technique in the verification of formally described programs. However, there is one major drawback in u...
Sari Leppänen, Matti Luukkainen
DIAGRAMS
2008
Springer
15 years 5 months ago
Supporting Reasoning and Problem-Solving in Mathematical Generalisation with Dependency Graphs
Abstract. We present a brief description of the design of a diagrambased system that supports the development of thinking about mathematical generalisation. Within the software, th...
Sergio Gutiérrez Santos, Darren Pearce, Eir...
ACSW
2004
15 years 5 months ago
A Buddy Model of Security for Mobile Agent Communities Operating in Pervasive Scenarios
This paper examines the security aspects of different pervasive scenarios involving agent communities evolved using multi agent systems (MAS). It describes the motivation and the ...
John Page, Arkady B. Zaslavsky, Maria Indrawan