You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Message Sequence Charts (MSC) have had an unanticipated success, both with SDL, on its own and in conjunction with other methods and tools. Major tool vendors now offer both SDL and MSC in their tool set. This timely volume reports on the recent developments in this expanding field. Several papers deal with language issues, tools and methods for effective use of MSC. Advances in "SDL technology" are discussed, and several papers deal with the early stages of product development and how SDL may be complemented by other methods, such as OMT, to improve problem understanding and make better SDL designs. New developments in the areas of tools for verification, validation and testing are also included, together with a large number of papers on applications.
This book constitutes the refereed proceedings of the Second International Conference on the Unified Modeling Language, UML'99, held in Fort Collins, CO, USA in September 1999. The 44 revised full papers presented together with two invited contributions and three panel summaries were carefully reviewed and selected from a total of 166 submissions. The papers are organized in topical sections on software architecture, UML and other notations, formalizing interactions, meta modeling, tools, components, UML extension mechanisms, process modeling, real-time systems, constraint languages, analyzing UML models, precise behavioral modeling, applying UML sequence design, and coding.
Formal methods are coming of age. Mathematical techniques and tools are now regarded as an important part of the development process in a wide range of industrial and governmental organisations. A transfer of technology into the mainstream of systems development is slowly, but surely, taking place. FM’99, the First World Congress on Formal Methods in the Development of Computing Systems, is a result, and a measure, of this new-found maturity. It brings an impressive array of industrial and applications-oriented papers that show how formal methods have been used to tackle real problems. These proceedings are a record of the technical symposium ofFM’99:alo- side the papers describingapplic...
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Information Security Applications, WISA 2009, held in Busan, Korea, during August 25-27, 2009. The 27 revised full papers presented were carefully reviewed and selected from a total of 79 submissions. The papers are organized in topical sections on mutlimedia security, device security, HW implementation security, applied cryptography, side channel attacks, cryptograptanalysis, anonymity/authentication/access controll, and network security.
The European conference situationin the general area of software science has longbeen considered unsatisfactory. A fairlylarge number of small and medi- sized conferences and workshops take place on an irregular basis, competing for high-quality contributions and for enough attendees to make them ?nancially viable. Discussions aiming at a consolidation have been underway since at least 1992, with concrete planning beginning in summer 1994 and culminating in a public meeting at TAPSOFT’95 in Aarhus. On the basis of a broad consensus, it was decided to establish a single annual federated spring conference in the slot that was then occupied by TAPSOFT and CAAP/ESOP/CC, comprising a number of existing and new conferences and covering a spectrum from theory to practice. ETAPS’98, the ?rst instance of the European Joint Conferences on Theory and Practice of Software, is taking place this year in Lisbon. It comprises ?ve conferences (FoSSaCS, FASE, ESOP, CC, TACAS), four workshops (ACoS, VISUAL, WADT, CMCS), seven invited lectures, and nine tutorials.
"An excellent book for those who are interested in learning the current status of research and development . . . [and] who want to get a comprehensive overview of the current state-of-the-art." —E-Streams This book provides up-to-date information on research and development in the rapidly growing area of networks based on the multihop ad hoc networking paradigm. It reviews all classes of networks that have successfully adopted this paradigm, pointing out how they penetrated the mass market and sparked breakthrough research. Covering both physical issues and applications, Mobile Ad Hoc Networking: Cutting Edge Directions offers useful tools for professionals and researchers in diverse areas...
This book constitutes the thoroughly refereed postproceedings of the 4th International Workshop on SDL and MSC, SAM 2004, held in Ottawa, Canada in June 2004. The 19 revised full papers presented were carefully selected during two rounds of reviewing and revision from initially 46 submissions. The papers are organized in topical sections on SDL and eODL, evolution of languages, requirements and MSC, security, SDL and modeling, and experience.
This volume contains the proceedings of the 2003 International Conference on Formal Engineering Methods (ICFEM 2003). The conference was the ?fth in a series that began in 1997. ICFEM 2003 was held in Singapore during 5–7 November 2003. ICFEM 2003 aimed to bring together researchers and practitioners from - dustry, academia, and government to advance the state of the art in formal engineering methods and to encourage a wider uptake of formal methods in industry. The Program Committee received 91 submissions from more than 20 co- tries in various regions. After each paper was reviewed by at least three referees in each relevant ?eld, 34 high-quality papers were accepted based on originality...
This book constitutes the refereed proceedings of the 13th International SDL Forum, SDL 2007, held in Paris, France. The 17 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on model driven engineering, testing, language extensions, implementation and modeling experience and extensions—-addressing all aspects of systems design and system design languages.
The Internet of Things is a wide-reaching network of devices, and these devices can intercommunicate and collaborate with each other to produce variety of services at any time, any place, and in any way. Maintaining access control, authentication and managing the identity of devices while they interact with other devices, services and people is an important challenge for identity management. The identity management presents significant challenges in the current Internet communication. These challenges are exacerbated in the internet of things by the unbound number of devices and expected limitations in constrained resources. Current identity management solutions are mainly concerned with ide...