Sciweavers

5525 search results - page 202 / 1105
» Verification of Model Transformations
Sort
View
146
Voted
CAV
2009
Springer
176views Hardware» more  CAV 2009»
16 years 4 months ago
PAT: Towards Flexible Verification under Fairness
Recent development on distributed systems has shown that a variety of fairness constraints (some of which are only recently defined) play vital roles in designing self-stabilizing ...
Jun Sun 0001, Yang Liu 0003, Jin Song Dong, Jun Pa...
127
Voted
IAT
2009
IEEE
15 years 10 months ago
Agent-Based Security System for User Verification
—We present a security system consisting of an arbitrary number of entries, sensors and agents. The intelligent integrated system is based on user modeling, i.e. models of their ...
Erik Dovgan, Bostjan Kaluza, Tea Tusar, Matjaz Gam...
141
Voted
ICASSP
2009
IEEE
15 years 10 months ago
A study of pronunciation verification in a speech therapy application
Techniques are presented for detecting phoneme level mispronunciations in utterances obtained from a population of impaired children speakers. The intended application of these ap...
Shou-Chun Yin, Richard Rose, Oscar Saz, Eduardo Ll...
197
Voted
AGTIVE
2007
Springer
15 years 7 months ago
Verification and Synthesis of OCL Constraints Via Topology Analysis
On the basis of a case-study, we demonstrate the usefulness of topology invariants for model-driven systems development. Considering a graph grammar semantics for a relevant fragme...
Jörg Bauer, Werner Damm, Tobe Toben, Bernd We...
144
Voted
C3S2E
2009
ACM
15 years 7 months ago
A verification framework for access control in dynamic web applications
This paper proposes a security analysis framework for dynamic web applications. A reverse engineering process is performed over a dynamic web application to extract a rolebased ac...
Manar H. Alalfi, James R. Cordy, Thomas R. Dean