Verification of Functional and Non-functional Requirements of Web Service Composition (Englisch)
- Neue Suche nach: Chen, M.
- Neue Suche nach: Tan, T.H.
- Neue Suche nach: Sun, J.
- Neue Suche nach: Liu, Y.
- Neue Suche nach: Pang, J.
- Neue Suche nach: Li, X.
- Neue Suche nach: Chen, M.
- Neue Suche nach: Tan, T.H.
- Neue Suche nach: Sun, J.
- Neue Suche nach: Liu, Y.
- Neue Suche nach: Pang, J.
- Neue Suche nach: Li, X.
- Neue Suche nach: Groves, Lindsay
- Neue Suche nach: Sun, Jing
In:
Formal methods and software engineering: 15th International Conference on Formal Engineering Methods, ICFEM 2013, Queenstown, New Zealand, October 29-November 1, 2013, proceedings /
8144
;
313-328
;
2013
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Verification of Functional and Non-functional Requirements of Web Service Composition
-
Beteiligte:
-
Kongress:International conference; 15th, Formal methods and software engineering: 15th International Conference on Formal Engineering Methods, ICFEM 2013, Queenstown, New Zealand, October 29-November 1, 2013, proceedings / ; 2013 ; Queenstown, New Zealand
-
Erschienen in:LECTURE NOTES IN COMPUTER SCIENCE , 8144 ; 313-328
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Heidelberg
-
Erscheinungsdatum:01.01.2013
-
Format / Umfang:16 pages
-
Anmerkungen:Includes bibliographical references and index. Also issued online.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Lattices of Information for Security: Deterministic, Demonic, ProbabilisticMorgan, C.C. et al. | 2013
- 4
-
Algebraic Laws for Process SubtypingDihego, J. / Antonino, P. / Sampaio, A. et al. | 2013
- 20
-
Boundness Issues in CCSL SpecificationsMallet, F. / Millo, J.-V. et al. | 2013
- 36
-
Mining Dataflow Sensitive SpecificationsZuo, Z. / Khoo, S.-C. et al. | 2013
- 53
-
A Proof Slicing Framework for Program VerificationLe, T.-C. / Gherghina, C. / Voicu, R. / Chin, W.-N. et al. | 2013
- 70
-
Formally Verified System InitialisationBoyton, A. / Andronick, J. / Bannister, C. / Fernandez, M. / Gao, X. / Greenaway, D. / Klein, G. / Lewis, C. / Sewell, T. et al. | 2013
- 86
-
Verifying an Aircraft Proximity Characterization Method in CoqLiu, D. / Fulton, N.L. / Zic, J. / de Groot, M. et al. | 2013
- 102
-
Assisting Specification Refinement by Random TestingLi, M. et al. | 2013
- 115
-
Generation of Checking Sequences Using Identification SetsPorto, F.R. / Endo, A.T. / Simao, A. et al. | 2013
- 131
-
The Circus Testing Theory Revisited in Isabelle/HOLFeliachi, A. / Gaudel, M.-C. / Wenzel, M. / Wolff, B. et al. | 2013
- 148
-
A CSP Timed Input-Output Relation and a Strategy for Mechanised Conformance VerificationCarvalho, G. / Sampaio, A. / Mota, A. et al. | 2013
- 165
-
Deadline Analysis of AUTOSAR OS Periodic Tasks in the Presence of InterruptsHuang, Y. / Ferreira, J.F. / He, G. / Qin, S. / He, J. et al. | 2013
- 182
-
Improving Model Checking Stateful Timed CSP with non-Zenoness through Clock-Symmetry ReductionSi, Y. / Sun, J. / Liu, Y. / Wang, T. et al. | 2013
- 199
-
A Modular Approach for Reusing Formalisms in Verification Tools of Concurrent SystemsAndre, E. / Barbot, B. / Demoulins, C. / Hillah, L.M. / Hulin-Hubard, F. / Kordon, F. / Linard, A. / Petrucci, L. et al. | 2013
- 215
-
A UTP Semantics for Communicating Processes with Shared VariablesShi, L. / Zhao, Y. / Liu, Y. / Sun, J. / Dong, J.S. / Qin, S. et al. | 2013
- 231
-
Verification of Static and Dynamic Barrier Synchronization Using Bounded PermissionsLe, D.-K. / Chin, W.-N. / Teo, Y.-M. et al. | 2013
- 249
-
Formal Models of SysML BlocksMiyazawa, A. / Lima, L. / Cavalcanti, A. et al. | 2013
- 265
-
Towards a Process Algebra Framework for Supporting Behavioural Consistency and Requirements Traceability in SysMLJacobs, J. / Simpson, A. et al. | 2013
- 281
-
Translation from Workflow Nets to MSVLShi, Y. / Duan, Z. / Tian, C. et al. | 2013
- 297
-
Asymptotic Bounds for Quantitative Verification of Perturbed Probabilistic SystemsSu, G. / Rosenblum, D.S. et al. | 2013
- 313
-
Verification of Functional and Non-functional Requirements of Web Service CompositionChen, M. / Tan, T.H. / Sun, J. / Liu, Y. / Pang, J. / Li, X. et al. | 2013
- 329
-
vTRUST: A Formal Modeling and Verification Framework for Virtualization SystemsHao, J. / Liu, Y. / Cai, W. / Bai, G. / Sun, J. et al. | 2013
- 347
-
Formal Kinematic Analysis of the Two-Link Planar ManipulatorFarooq, B. / Hasan, O. / Iqbal, S. et al. | 2013
- 363
-
Formal Modelling of Resilient Data Storage in CloudPereverzeva, I. / Laibinis, L. / Troubitsyna, E. / Holmberg, M. / Pori, M. et al. | 2013
- 380
-
Linking Operational Semantics and Algebraic Semantics for Wireless NetworksWu, X. / Zhu, H. et al. | 2013
- 397
-
Automated Specification Discovery via User-Defined PredicatesHe, G. / Qin, S. / Chin, W.-N. / Craciun, F. et al. | 2013
- 415
-
Path-Sensitive Data Flow Analysis SimplifiedWinter, K. / Zhang, C. / Hayes, I.J. / Keynes, N. / Cifuentes, C. / Li, L. et al. | 2013
- 431
-
Reconstructing Paths for Reachable CodeArlt, S. / Liu, Z. / Schaf, M. et al. | 2013
- 447
-
The Domain of Parametric Hypercubes for Static Analysis of Computer Games SoftwareCostantini, G. / Ferrara, P. / Maggiore, G. / Cortesi, A. et al. | 2013