Sciweavers

211 search results - page 27 / 43
» Verification of Workflow Nets
Sort
View
FAST
2009
14 years 7 months ago
Application of Named Graphs Towards Custom Provenance Views
Provenance capture as applied to execution oriented and interactive workflows is designed to record minute detail needed to support a "modify and restart" paradigm as we...
Tara Gibson, Karen Schuchardt, Eric G. Stephan
APN
2008
Springer
14 years 11 months ago
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
Abstract. In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authent...
Roland Bouroulet, Raymond R. Devillers, Hanna Klau...
ICALP
2000
Springer
15 years 1 months ago
Efficient Verification Algorithms for One-Counter Processes
We study the problem of strong/weak bisimilarity between processes of one-counter automata and finite-state processes. We show that the problem of weak bisimilarity between process...
Antonín Kucera
SIGSOFT
1996
ACM
15 years 1 months ago
Abstracting Dependencies between Software Configuration Items
ing Dependencies between Software Configuration Items CARL A. GUNTER University of Pennsylvania icle studies an abstract model of dependencies between software configuration items ...
Carl A. Gunter
72
Voted
VVEIS
2007
14 years 10 months ago
Transformation of BPMN Models for Behaviour Analysis
Abstract. In industry, many business processes are modelled and stored in Enterprise Information Systems (EIS). Tools supporting the verification and validation of business process...
Ivo Raedts, Marija Petkovic, Yaroslav S. Usenko, J...