-
1
-
-
84891475935
-
-
Springer ISBN 978-3-642-15227-6
-
Debbabi, M., Hassaïne, F., Jarraya, Y., Soeanu, A., Alawneh, L.: Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models, p. 270. Springer (2010) ISBN 978-3-642-15227-6
-
(2010)
Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models
, pp. 270
-
-
Debbabi, M.1
Hassaïne, F.2
Jarraya, Y.3
Soeanu, A.4
Alawneh, L.5
-
2
-
-
84870660277
-
-
Atego ARTiSAN Studio, http://www.atego.com/products/artisan-studio/
-
Atego ARTiSAN Studio
-
-
-
3
-
-
84870666470
-
-
SysML Companion, http://www.realtimeatwork.com/software/sysml-companion/
-
SysML Companion
-
-
-
4
-
-
84867978578
-
A Case Study in Formal System Engineering with SysML
-
IEEE Computer Society
-
Dragomir, I., Ober, I., Lesens, D.: A Case Study in Formal System Engineering with SysML. In: 17th International Conference on Engineering of Complex Computer Systems (ICECCS 2012), pp. 189-198. IEEE Computer Society (2012)
-
(2012)
17th International Conference on Engineering of Complex Computer Systems (ICECCS 2012)
, pp. 189-198
-
-
Dragomir, I.1
Ober, I.2
Lesens, D.3
-
5
-
-
84885717971
-
-
TOPCASED, http://www.topcased.org
-
-
-
-
6
-
-
84885757441
-
-
TTool, http://ttool.telecom-paristech.fr
-
-
-
-
7
-
-
80855147327
-
TEPE: A SysML Language for Time-Constrained Property Modeling and Formal Verification
-
Knorreck, D., Apvrille, L., De Saqui-Sannes, P.: TEPE: A SysML Language for Time-Constrained Property Modeling and Formal Verification. ACM SIGSOFT Software Engineering Notes 36(1), 1-8 (2012)
-
(2012)
ACM SIGSOFT Software Engineering Notes
, vol.36
, Issue.1
, pp. 1-8
-
-
Knorreck, D.1
Apvrille, L.2
De Saqui-Sannes, P.3
-
8
-
-
80051991023
-
AVATAR: A SysML Environment for the Formal Verification of Safety and Security Properties
-
IEEE
-
Pedroza, G., Knorreck, D., Apvrille, L.: AVATAR: A SysML Environment for the Formal Verification of Safety and Security Properties. In: New Technologies of Distributed Systems (NOTERE), pp. 1-10. IEEE (2011), http://dx.doi.org/10. 1109/NOTERE.2011.5957992
-
(2011)
New Technologies of Distributed Systems (NOTERE)
, pp. 1-10
-
-
Pedroza, G.1
Knorreck, D.2
Apvrille, L.3
-
10
-
-
35048861846
-
Timed automata: Semantics, algorithms and tools
-
Bengtsson, J., Yi, W.: Timed Automata: Semantics, Algorithms and Tools. In: Desel, J., Reisig, W., Rozenberg, G. (eds.) ACPN 2003. LNCS, vol. 3098, pp. 87-124. Springer, Heidelberg (2004) (Pubitemid 39739357)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3098
, pp. 87-124
-
-
Bengtsson, J.1
Yi, W.2
-
11
-
-
84865448973
-
Using Horn Clauses for Analyzing Security Protocols
-
Formal Models and Techniques for Analyzing Security Protocols. IOS Press
-
Blanchet, B.: Using Horn Clauses for Analyzing Security Protocols. In: Formal Models and Techniques for Analyzing Security Protocols. Cryptology and Information Security Series, vol. 5, pp. 86-111. IOS Press (2011)
-
(2011)
Cryptology and Information Security Series
, vol.5
, pp. 86-111
-
-
Blanchet, B.1
-
12
-
-
0024645936
-
Petri Nets: Properties, Analysis and Applications
-
Murata, T.: Petri Nets: Properties, Analysis and Applications. Proceedings of the IEEE 77(4), 541-580 (1989)
-
(1989)
Proceedings of the IEEE
, vol.77
, Issue.4
, pp. 541-580
-
-
Murata, T.1
-
13
-
-
0020310622
-
Modeling and analysis of communication and cooperation protocols using petri net based models
-
Diaz, M.: Modeling and analysis of communication and cooperation protocols using petri net based models. Computer Networks 6(6), 419-441 (1982)
-
(1982)
Computer Networks
, vol.6
, Issue.6
, pp. 419-441
-
-
Diaz, M.1
-
16
-
-
0000285139
-
Improving the Linearly Based Characterization of P/T Nets
-
Rozenberg, G. (ed.) APN 1990. Springer, Heidelberg
-
Colom, J.-M., Silva, M.: Improving the Linearly Based Characterization of P/T Nets. In: Rozenberg, G. (ed.) APN 1990. LNCS, vol. 483, pp. 113-145. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.483
, pp. 113-145
-
-
Colom, J.-M.1
Silva, M.2
-
17
-
-
77950397788
-
-
Technical Report Deliverable D2.1, EVITA Project
-
Kelling, E., Friedewald, M., Leimbach, T., Menzel, M., Séger, P., Seudié, H., Weyl, B.: Specification and evaluation of e-security relevant use cases. Technical Report Deliverable D2.1, EVITA Project (2009)
-
(2009)
Specification and Evaluation of E-security Relevant Use Cases
-
-
Kelling, E.1
Friedewald, M.2
Leimbach, T.3
Menzel, M.4
Séger, P.5
Seudié, H.6
Weyl, B.7
-
20
-
-
80855132631
-
UML/SysML semantic tunings
-
Ober, I., Ober, I., Dragomir, I., Aboussoror, E.A.: UML/SysML semantic tunings. Innovations in Systems and Software Engineering 7(4), 257-264 (2011)
-
(2011)
Innovations in Systems and Software Engineering
, vol.7
, Issue.4
, pp. 257-264
-
-
Ober, I.1
Ober, I.2
Dragomir, I.3
Aboussoror, E.A.4
-
22
-
-
0020151817
-
REBUS, A Fault-Tolerant Distributed System for Industrial Real-Time Control
-
Ayache, J.-M., Courtiat, J.-P., Diaz, M.: REBUS, A Fault-Tolerant Distributed System for Industrial Real-Time Control. IEEE Transactions on Computers 31(7), 637-647 (1982)
-
(1982)
IEEE Transactions on Computers
, vol.31
, Issue.7
, pp. 637-647
-
-
Ayache, J.-M.1
Courtiat, J.-P.2
Diaz, M.3
-
24
-
-
0000098171
-
Coloured Petri Nets and the Invariant Method
-
Jensen, K.: Coloured Petri Nets and the Invariant Method. Theoretical Computer Science 14(3), 317-336 (2002)
-
(2002)
Theoretical Computer Science
, vol.14
, Issue.3
, pp. 317-336
-
-
Jensen, K.1
|