Sciweavers

1998 search results - page 172 / 400
» Situated Control Rules
Sort
View
ER
2010
Springer
249views Database» more  ER 2010»
15 years 3 months ago
On Enabling Data-Aware Compliance Checking of Business Process Models
In the light of an increasing demand on business process compliance, the verication of process models against compliance rules has become essential in enterprise computing. To be ...
David Knuplesch, Linh Thao Ly, Stefanie Rinderle-M...
GG
2010
Springer
15 years 3 months ago
Formal Analysis of Functional Behaviour for Model Transformations Based on Triple Graph Grammars
Abstract. Triple Graph Grammars (TGGs) are a well-established concept for the specification of model transformations. In previous work we have formalized and analyzed already cruc...
Frank Hermann, Hartmut Ehrig, Fernando Orejas, Ulr...
ICST
2009
IEEE
15 years 2 months ago
A Flexible Framework for Quality Assurance of Software Artefacts with Applications to Java, UML, and TTCN-3 Test Specifications
Manual reviews and inspections of software artefacts are time consuming and thus, automated analysis tools have been developed to support the quality assurance of software artefac...
Jens Nodler, Helmut Neukirchen, Jens Grabowski
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 11 months ago
Automatically Segregating Greedy and Malicious Internet Flows
— In the current Internet, compliance with TCP congestion control rules is voluntary. Noncompliant flows can gain unfair performance advantages or deny service to other flows. ...
José Carlos Brustoloni, Shuo Chen
CSFW
2006
IEEE
15 years 10 months ago
Non-Interference in Constructive Authorization Logic
We present a constructive authorization logic where the meanings of connectives are defined by their associated inference rules. This ensures that the logical reading of access c...
Deepak Garg, Frank Pfenning