By Topic

Formal Methods (SEEFM), 2009 Fourth South-East European Workshop on

Date 4-5 Dec. 2009

Filter Results

Displaying Results 1 - 22 of 22
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1191 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (95 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2009, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • Invited Speaker: Formally Specifying Autonomous and Agent-Based NASA Space Exploration Missions

    Publication Year: 2009, Page(s): ix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (61 KB) | HTML iconHTML

    [Summary form only given]. NASA plans innovative and novel approaches to future (unmanned) space exploration missions. Future missions involve sending spacecraft and robots to harsh environments, where resilience is necessary for the survival of the mission. In addition, distances and communication lead times between the spacecraft and Earth, necessitate much of the mission operation being autonom... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invited Speaker: Deciding Properties of Services

    Publication Year: 2009, Page(s): x
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (66 KB) | HTML iconHTML

    Summary form only given. Service orientation is a promising architectural concept to quickly and cost effectively compose encapsulated software components ("services"), and to adapt them to new requirements. Service orientation has evolved from very pragmatic problems and backgrounds. Central in the context of service-oriented computing is the notion of a partner service P for a given service, S. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Service Composition with Symbolic Effects

    Publication Year: 2009, Page(s):3 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    Local policies represent security properties that are applied to (parts of) programs or services. They are amenable for developers since they provide for a full compositionality (through scope nesting), for a simple, automaton-like structure and for a direct enforcing through a corresponding execution monitor. Compliance w.r.t. local policies is statically verified against a safe over-approximatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Local Enforceability and Inconsumable Messages in Choreography Models

    Publication Year: 2009, Page(s):10 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    Choreography models describe the communication protocols between services. Every choreography model can be considered either from a global or from a local point of view. The global model specifies a high-level view of the conversation between service components, and can be considered as being interpreted from an observer point of view. The local model is derived from the global model, and specifie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for Testing Semantic Web Services Using Model Checking

    Publication Year: 2009, Page(s):17 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    Web Services (WS), which are based on standard XML protocols, such as, WSDL, SOAP and UDDI, are the building blocks of Service Oriented Architecture (SOA). The aim of SOA is to automate web service tasks, such as, web service discovery, selection, composition and execution. Since XML is a syntax-based language, the automation of these tasks is still a challenge. To overcome this, web services can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal Visual Modelling of Human Agents in Service Oriented Systems

    Publication Year: 2009, Page(s):25 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1602 KB) | HTML iconHTML

    When the level of granularity of services approaches that of business activities, humans become part of a service-oriented system not just as users but as providers of services. A model of such a system has to take into account the characteristics of human actors as service providers. Conversely, in the world of agent-based systems, software components have been attributed with human properties su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transforming Mobile UML Statecharts Models to Nested Nets Models Using Graph Grammars: An Approach for Modeling and Analysis of Mobile Agent-Based Software Systems

    Publication Year: 2009, Page(s):33 - 39
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1218 KB) | HTML iconHTML

    The Unified Modelling Language (UML) is a language for the specification, visualization, and documentation of object-oriented software systems. M-UML is an extension of UML that deals with the mobility requirements needed for modelling mobile agent-based software systems. In this paper we propose an approach for transforming mobile UML Statechart diagrams to Nested nets models for analysis purpose... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying Weighted Finite State Machines to Protocol Performance Analysis

    Publication Year: 2009, Page(s):40 - 45
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    This work proposes the use of a weighted Finite State Machine to serve as a computational model for analyzing the performance of communication protocols. The new model's use is demonstrated by concentrating on web-based services, Internet level-5 protocols in particular, because when the latter are ported onto mobile handsets, fail to meet performance expectations. The same modeling technique can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Algebraic Specification for the MPEG-2 Encoding Algorithm

    Publication Year: 2009, Page(s):46 - 52
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    The MPEG-2 encoding algorithm is a compression tool for moving pictures and associated audio, developed by the Moving Picture Experts Group (MPEG) and is designed to cover a wide range of requirements from ¿VHS quality¿ to¿HDTV¿. The compression methods used by MPEG-2 are considered to be asymmetrical in the meaning that the encoder is more complex than the decoder. This approach is new becaus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protocol-Based Testing of Firewalls

    Publication Year: 2009, Page(s):53 - 59
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (407 KB) | HTML iconHTML

    A firewall is the most important tool of network security defense. Its proper functioning is critical to the network it protects. Therefore a firewall should be tested rigorously with respect to its implemented network protocols and security policy specification. We propose a combined approach for test case generation to uncover errors both in firewall software and in its configuration. In the pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring Games as Formal Models

    Publication Year: 2009, Page(s):60 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    Computer games have become increasingly complex. Modern game specifications need to accommodate many detailed design documents, which results in increasing complexity. Complex games are difficult to understand, maintain and update, but their software cannot be extensively functional, as this might confuse the player. Consequently, game developers can benefit from following precise guidelines to de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From ASN.1 into CafeOBJ: Some First Steps

    Publication Year: 2009, Page(s):66 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    Abstract Syntax Notation One (ASN.1) is a very popular specification language with many applications in networking. We work towards the correct translation from ASN.1, into the powerful algebraic specification language CafeOBJ. Our aim is to create a software environment that can translate correctly a protocol's specification written in ASN.1 into the powerful algebraic specification language Cafe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From UML Statecharts and Collaboration Diagrams to Coloured Petri Nets Models: A Graph Transformation Based Approach for Modelling and Analysis of Business Processes in Virtual Enterprises

    Publication Year: 2009, Page(s):73 - 78
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (477 KB) | HTML iconHTML

    Virtual Enterprises can be considered as one of the most promising paradigms for future enterprises. The main characteristics of Virtual Enterprises are the distributed and parallel business process execution. UML is considered nowadays as the standardized language for object oriented modeling. However, UML needs a well-defined semantic base for its notation. Petri nets (PNs) are a formal and grap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2009, Page(s): 79
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • [Publisher's information]

    Publication Year: 2009, Page(s): 80
    Request permission for commercial reuse | PDF file iconPDF (142 KB) | HTML iconHTML
    Freely Available from IEEE