169 results on '"Amel Mammar"'
Search Results
2. An Iterative Formal Model-Driven Approach to Railway Systems Validation.
3. An Event-B Model of a Mechanical Lung Ventilator.
4. An Event-B model of an automotive adaptive exterior light system.
5. Modeling of a speed control system using Event-B.
6. A Tool-Supported Approach for Modeling and Verifying Hybrid Systems using EVENT-B and the Differential Equation Solver SAGEMATH.
7. Proving Local Invariants in ASTDs.
8. Modeling and Verifying an Arrival Manager Using Event-B.
9. Building Correct Hybrid Systems using Event-B and Sagemath: Illustration by the Hybrid Smart Heating System Case Study.
10. A formal approach for the correct deployment of cloud applications.
11. A Correct-by-Construction Model for Verifying Transactional Composite Services Configuration.
12. An Event-B-Based Approach to Model and Verify Behaviors for Component-Based Applications.
13. An Event-B Model of an Automotive Adaptive Exterior Light System.
14. Modeling of a Speed Control System Using Event-B.
15. Modelling Hybrid Programs with Event-B.
16. Intrusion Detection Using ASTDs.
17. A Formal Requirements Modeling Approach: Application to Rail Communication.
18. Assessment of a Formal Requirements Modeling Approach on a Transportation System.
19. Modeling the hybrid ERTMS/ETCS level 3 standard using a formal requirements engineering approach.
20. A formal refinement-based analysis of the hybrid ERTMS/ETCS level 3 standard.
21. Modeling the Hybrid ERTMS/ETCS Level 3 Standard Using a Formal Requirements Engineering Approach.
22. An Event-B Model of the Hybrid ERTMS/ETCS Level 3 Standard.
23. Event-B Expression and Verification of Translation Rules Between SysML/KAOS Domain Models and B System Specifications.
24. Back Propagating B System Updates on SysML/KAOS Domain Models.
25. Extended Algebraic State-Transition Diagrams.
26. Formalisation of SysML/KAOS Goal Assignments with B System Component Decompositions.
27. Intrusion Detection Systems: A Cross-Domain Overview.
28. SGAC: A Multi-Layered Access Control Model with Conflict Resolution Strategy.
29. Towards correct cloud resource allocation in FOSS applications.
30. Modeling and proving hybrid programs with Event-B: An approach by generalization and instantiation.
31. Towards Using Ontologies for Domain Modeling within the SysML/KAOS Approach.
32. Verification of SGAC Access Control Policies Using Alloy and ProB.
33. Parameterized verification of monotone information systems.
34. Formal Verification of Cloud Resource Allocation in Business Processes Using Event-B.
35. On the Use of Domain and System Knowledge Modeling in Goal-Based Event-B Specifications.
36. SGAC: A patient-centered access control method.
37. A tool for the generation of a secure access control filter.
38. An Event-B Based Approach for Ensuring Correct Configurable Business Processes.
39. Formal Development of a Secure Access Control Filter.
40. A Formal Guidance Approach for Correct Process Configuration.
41. A Correct-by-Construction Model for Verifying Transactional Composite Services Configuration
42. A verification and deployment approach for elastic component-based applications.
43. Towards Correct Cloud Resource Allocation in Business Processes.
44. Modeling a landing gear system in Event-B.
45. A formal approach to derive an aspect oriented programming-based implementation of a secure access control filter.
46. An automated approach for merging business process fragments.
47. A formal validation of the RBAC ANSI 2012 standard using B.
48. Business Process Fragments Behavioral Merge.
49. A Tool for Verifying Dynamic Properties in B.
50. Modeling a Landing Gear System in Event-B.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.