Sciweavers

5525 search results - page 222 / 1105
» Verification of Model Transformations
Sort
View
COOPIS
2004
IEEE
15 years 8 months ago
Analysis, Transformation, and Improvements of ebXML Choreographies Based on Workflow Patterns
In ebXML the choreography of a business process should be modeled by UMM (UN/CEFACT Modeling Methodology) and is finally expressed in BPSS (Business Process Specification Schema). ...
Ja-Hee Kim, Christian Huemer
MODELS
2010
Springer
15 years 2 months ago
Transformation-Based Parallelization of Request-Processing Applications
Abstract. Multicore, multithreaded processors are rapidly becoming the platform of choice for high-throughput request-processing applications (RPAs). We refer to this class of mode...
Taylor L. Riché, Harrick M. Vin, Don S. Bat...
CAV
2009
Springer
209views Hardware» more  CAV 2009»
16 years 5 months ago
Static and Precise Detection of Concurrency Errors in Systems Code Using SMT Solvers
Context-bounded analysis is an attractive approach to verification of concurrent programs. Bounding the number of contexts executed per thread not only reduces the asymptotic compl...
Shuvendu K. Lahiri, Shaz Qadeer, Zvonimir Rakamari...
LOPSTR
1994
Springer
15 years 8 months ago
More on Unfold/Fold Transformations of Normal Programs: Preservation of Fitting's Semantics
The unfold/fold transformation system defined by Tamaki and Sato was meant for definite programs. It transforms a program into an equivalent one in the sense of both the least tter...
Annalisa Bossi, Sandro Etalle
HPDC
2010
IEEE
15 years 5 months ago
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Data is routinely created, disseminated, and processed in distributed systems that span multiple administrative domains. To maintain accountability while the data is transformed b...
Ashish Gehani, Minyoung Kim