One of the prominent principles of designing services is the matter of how abstract services should be i.e. granularity. Since service-oriented analysis and design methods lack on providing a quantitative model for se...
详细信息
Business transactions are prone to failure and having to deal with unexpected situations. Some business process specification languages, e.g. StAC, introduce notions like compensation handling. Given the need of verif...
详细信息
This paper proposes a model-driven approach for the analysis of multimedia documents. Structural and behavioral properties of a multimedia document are verified thus guaranteeing its well-formedness and conformance be...
详细信息
This paper proposes a model-driven approach for the analysis of multimedia documents. Structural and behavioral properties of a multimedia document are verified thus guaranteeing its well-formedness and conformance before deployment. Multimedia documents are interpreted as object model instances of a multimedia document metamodel. Structural properties are verified using consistency reasoning over an ontology representation of the given object model together with OCL invariant validation (i.e., the application of OCL invariants to the given object model). Behavioral properties are verified through model checking on the transition system associated to the given multimedia document. Both metamodel and user-defined behavioral properties are verified.
What are the key drivers of the (Industrial) Internet of Things ((I)IoT)? Alongside the interconnection of the various devices, sensors, and actuators, it is above all the data collected and transmitted that is of par...
详细信息
This paper explores the run time performance improvements using different GCC optimization flags in program compilation. As multi-core microprocessor systems replacing legacy single-core ones, tremendous effort is nee...
详细信息
Identifying misbehaviors is an important challenge for monitoring, fault diagnosis and intrusion detection in wireless sensor networks. A key problem is how to minimise the communication overhead and energy consumptio...
详细信息
In this paper, we propose a simple but robust scheme to detect denial of service attacks (including distributed denial of service attacks) by monitaring the increase of new IP addresses. Unlike previous proposals for ...
详细信息
Energy resilience in renewable energy sources dissemination components such as batteries and inverters is crucial for achieving high operational fidelity. Resilience factors play a vital role in determining the perfor...
详细信息
In the recent decade, new automated methodologies such as the Model Driven Development (MDD) and Model-Based Testing (MBT) are under evaluation for embedded systems development and testing. However, most of the curren...
详细信息
暂无评论