Sciweavers

2517 search results - page 72 / 504
» Specifying Weak Sets
Sort
View
EWSPT
2000
Springer
15 years 3 months ago
A CMM-Based Evaluation of the V-Model 97
The V-Model 97 is a widely used process model in Germany and Europe. It is the development standard for IT-Systems of the Federal Republic of Germany and the basis of Austria'...
Viktor Schuppan, Winfried Rußwurm
WDAG
2000
Springer
87views Algorithms» more  WDAG 2000»
15 years 3 months ago
A Probabilistically Correct Leader Election Protocol for Large Groups
This paper presents a scalable leader election protocol for large process groups with a weak membership requirement. The underlying network is assumed to be unreliable but characte...
Indranil Gupta, Robbert van Renesse, Kenneth P. Bi...
FMOODS
2008
15 years 1 months ago
Behavioural Theory at Work: Program Transformations in a Service-Centred Calculus
We analyse the relationship between object-oriented modelling and session-based, service-oriented modelling, starting from a typical UML Sequence Diagram and providing a program tr...
Luís Cruz-Filipe, Ivan Lanese, Francisco Ma...
ICWS
2008
IEEE
15 years 1 months ago
A Formal Model of Human Workflow
BPEL (Business Process Execution Language) has become the standard for specifying and executing workflow specifications for web service composition invocation. A major weakness of ...
Xiangpeng Zhao, Zongyan Qiu, Chao Cai, Hongli Yang
I3E
2001
196views Business» more  I3E 2001»
15 years 1 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel