Sciweavers

5525 search results - page 119 / 1105
» Verification of Model Transformations
Sort
View
152
Voted
IJNSEC
2010
100views more  IJNSEC 2010»
14 years 10 months ago
On the Security of Yuan et al.'s Undeniable Signature Scheme
Undeniable signatures were proposed to limit the public verification property of ordinary digital signature. In fact, the verification of such signatures cannot be obtained withou...
Wei Zhao
74
Voted
MODELS
2009
Springer
15 years 10 months ago
An Approach for Evolving Transformation Chains
Andrés Yie, Rubby Casallas, Dennis Wagelaar...
DATE
2006
IEEE
117views Hardware» more  DATE 2006»
15 years 9 months ago
Formal verification of systemc designs using a petri-net based representation
This paper presents an effective approach to formally verify SystemC designs. The approach translates SystemC models into a Petri-Net based representation. The Petri-net model is ...
Daniel Karlsson, Petru Eles, Zebo Peng
PAAMS
2009
Springer
15 years 7 months ago
A Tool for Generating Model Transformations By-Example in Multi-Agent Systems
Abstract Many Multi-Agent Systems (MAS) methodologies incorporate a modeldriven approach. Model Driven Engineering is based on three main ideas: models are the “first-class citi...
Iván García-Magariño, Sylvain...
SAFECOMP
1998
Springer
15 years 7 months ago
Safety Verification of Software Using Structured Petri Nets
A method is described for the analysis and the verification of safety in software systems. The method offers a formal notation for describing the software structure, the means for ...
Krzysztof Sacha