Sciweavers

5525 search results - page 55 / 1105
» Verification of Model Transformations
Sort
View
KBSE
2005
IEEE
15 years 3 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
CASCON
2001
115views Education» more  CASCON 2001»
14 years 11 months ago
Lightweight reasoning about program correctness
Automated verification tools vary widely in the types of properties they are able to analyze, the complexity of their algorithms, and the amount of necessary user involvement. In ...
Marsha Chechik, Wei Ding
SBMF
2010
Springer
205views Formal Methods» more  SBMF 2010»
14 years 4 months ago
A High-Level Language for Modeling Algorithms and Their Properties
Designers of concurrent and distributed algorithms usually express them using pseudo-code. In contrast, most verification techniques are based on more mathematically-oriented forma...
Sabina Akhtar, Stephan Merz, Martin Quinson
ENTCS
2008
98views more  ENTCS 2008»
14 years 9 months ago
Graph Transformation Semantics for a QVT Language
It has been claimed by many in the graph transformation community that model transformation, as understood in the context of Model Driven Architecture, can be seen as an applicati...
Arend Rensink, Ronald Nederpel
EDBT
2008
ACM
120views Database» more  EDBT 2008»
15 years 9 months ago
Schema mapping verification: the spicy way
Schema mapping algorithms rely on value correspondences ? i.e., correspondences among semantically related attributes ? to produce complex transformations among data sources. Thes...
Angela Bonifati, Giansalvatore Mecca, Alessandro P...