Sciweavers

1700 search results - page 87 / 340
» Specifying and implementing refactorings
Sort
View
ENTCS
2008
125views more  ENTCS 2008»
15 years 4 months ago
Extending Lustre with Timeout Automata
This paper describes an extension to Lustre to support the analysis of globally asynchronous, locally synchronous (GALS) architectures. This extension consists of constructs for d...
Jimin Gao, Mike Whalen, Eric Van Wyk
CORR
2006
Springer
113views Education» more  CORR 2006»
15 years 4 months ago
Event Systems and Access Control
Abstract. We consider the interpretations of notions of access control (permissions, interdictions, obligations, and user rights) as run-time properties of information systems spec...
Dominique Méry, Stephan Merz
ENTCS
2006
137views more  ENTCS 2006»
15 years 4 months ago
Automated Security Protocol Analysis With the AVISPA Tool
The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security Protocols and Applications. It provides a modular and expressive formal language for specif...
Luca Viganò
EOR
2006
97views more  EOR 2006»
15 years 4 months ago
Bayesian portfolio selection with multi-variate random variance models
We consider multi-period portfolio selection problems for a decision maker with a specified utility function when the variance of security returns is described by a discrete time ...
Refik Soyer, Kadir Tanyeri
IBIS
2006
69views more  IBIS 2006»
15 years 4 months ago
A Framework for Assessing Inter-Organizational Integration of Business Information Systems
: This paper presents a framework for assessing inter-organizational integration of business information systems. The framework is organized along two dimensions, intensity of inte...
Dirk Stelzer, Daniel Fischer, Ina Nirsberger