Observation-enhanced verification of operational processes
暂无分享,去创建一个
[1] Radu Calinescu,et al. Self-Adaptive Role-Based Access Control for Business Processes , 2017, 2017 IEEE/ACM 12th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS).
[2] Carsten Sinz,et al. Probabilistic Model Checking of Constraints in a Supply Chain Business Process , 2011, BIS.
[3] Radu Calinescu,et al. Compositional Reverification of Probabilistic Safety Properties for Large-Scale Complex IT Systems , 2012, Monterey Workshop.
[4] Philipp Reinecke,et al. HyperStar: Phase-Type Fitting Made Easy , 2012, 2012 Ninth International Conference on Quantitative Evaluation of Systems.
[5] N. Schenker,et al. On Judging the Significance of Differences by Examining the Overlap Between Confidence Intervals , 2001 .
[6] Lijun Zhang,et al. Probabilistic reachability for parametric Markov models , 2010, International Journal on Software Tools for Technology Transfer.
[7] Steffen Becker,et al. Performance Prediction of Component-Based Systems - A Survey from an Engineering Perspective , 2004, Architecting Systems with Trustworthy Components.
[8] Carlo Ghezzi,et al. Mining behavior models from user-intensive web applications , 2014, ICSE.
[9] Kirill Kireyev. Applications of Topics Models to Analysis of Disaster-Related Twitter Data , 2009 .
[10] David Garlan,et al. Rainbow: architecture-based self-adaptation with reusable infrastructure , 2004 .
[11] Damjan Skulj,et al. Discrete time Markov chains with interval probabilities , 2009, Int. J. Approx. Reason..
[12] Joseph Glaz,et al. Simultaneous Confidence Intervals and Sample Size Determination for Multinomial Proportions , 1995 .
[13] Dang Van Hung,et al. Verification of an Air-Traffic Control System with Probabilistic Real-time Model-checking , 2007 .
[14] Andrew P. Moore,et al. Common Sense Guide to Mitigating Insider Threats 4th Edition , 2012 .
[15] Amir Pnueli,et al. In Transition From Global to Modular Temporal Reasoning about Programs , 1989, Logics and Models of Concurrent Systems.
[16] Aldo Cumani,et al. ML estimation of the parameters of a PH distribution in triangular canonical form , 2014 .
[17] Joost-Pieter Katoen,et al. The Ins and Outs of the Probabilistic Model Checker MRMC , 2009, 2009 Sixth International Conference on the Quantitative Evaluation of Systems.
[18] David Barnes. Understanding business : processes , 2001 .
[19] Gethin Norman,et al. Quantitative Verification: Formal Guarantees for Timeliness, Reliability and Performance , 2014 .
[20] Claudia Keser,et al. Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[21] Robert Power,et al. An Evidence Based Earthquake Detector using Twitter , 2013, LPCI@IJCNLP.
[22] Orna Grumberg,et al. Model checking and modular verification , 1994, TOPL.
[23] Carlo Ghezzi,et al. Engineering topology aware adaptive security: Preventing requirements violations at runtime , 2014, 2014 IEEE 22nd International Requirements Engineering Conference (RE).
[24] Carlo Ghezzi,et al. Formal Verification With Confidence Intervals to Establish Quality of Service Properties of Software Systems , 2016, IEEE Transactions on Reliability.
[25] S. Creese,et al. Caught in the act of an insider attack: detection and assessment of insider threat , 2015, 2015 IEEE International Symposium on Technologies for Homeland Security (HST).
[26] Kamel Adi,et al. Dynamic risk-based decision methods for access control systems , 2012, Comput. Secur..
[27] Kishor S. Trivedi,et al. Stochastic Modeling of Composite Web Services for Closed-Form Analysis of Their Performance and Reliability Bottlenecks , 2007, ICSOC.
[28] Sadie Creese,et al. Identifying attack patterns for insider threat detection , 2015 .
[29] Miklós Telek,et al. Matching More Than Three Moments with Acyclic Phase Type Distributions , 2007 .
[30] William J. Stewart,et al. Probability, Markov Chains, Queues, and Simulation: The Mathematical Basis of Performance Modeling , 2009 .
[31] Souheib Baarir,et al. The GreatSPN tool: recent enhancements , 2009, PERV.
[32] Nathanael Chambers,et al. Detecting Denial-of-Service Attacks from Social Media Text: Applying NLP to Computer Security , 2018, NAACL.
[33] David W. Chadwick,et al. PERMIS: a modular authorization infrastructure , 2008 .
[34] Edmund M. Clarke,et al. Design and Synthesis of Synchronization Skeletons Using Branching-Time Temporal Logic , 1981, Logic of Programs.
[35] Ravi S. Sandhu,et al. A framework for risk-aware role based access control , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[36] Jin Liu,et al. Segment-based adaptive hyper-Erlang model for long-tailed network traffic approximation , 2008, The Journal of Supercomputing.
[37] J. Neyman. Outline of a Theory of Statistical Estimation Based on the Classical Theory of Probability , 1937 .
[38] Sebastian Junges,et al. A Storm is Coming: A Modern Probabilistic Model Checker , 2017, CAV.
[39] Ward Whitt,et al. CONTINUOUS-TIME MARKOV CHAINS , 2006 .
[40] Lijun Zhang,et al. Probabilistic CEGAR , 2008, CAV.
[41] Chris Chatfield,et al. Statistical Inference Regarding Markov Chain Models , 1973 .
[42] Radu Calinescu,et al. Implementation of a Generic Autonomic Framework , 2008, Fourth International Conference on Autonomic and Autonomous Systems (ICAS'08).
[43] Heiko Koziolek,et al. Performance evaluation of component-based software systems: A survey , 2010, Perform. Evaluation.
[44] Jaehong Park,et al. The UCONABC usage control model , 2004, TSEC.
[45] Sherif Abdelwahed,et al. A Probabilistic Approach to Autonomic Security Management , 2016, 2016 IEEE International Conference on Autonomic Computing (ICAC).
[46] Joost-Pieter Katoen,et al. Simulation-Based CTMC Model Checking: An Empirical Evaluation , 2009, 2009 Sixth International Conference on the Quantitative Evaluation of Systems.
[47] Thomas H. Davenport,et al. Process Innovation: Reengineering Work Through Information Technology , 1992 .
[48] Nils Jansen,et al. Accelerating Parametric Probabilistic Verification , 2014, QEST.
[49] Steffen Becker,et al. The Palladio component model for model-driven performance prediction , 2009, J. Syst. Softw..
[50] Christel Baier,et al. Principles of model checking , 2008 .
[51] Yuguang Fang,et al. Teletraffic analysis and mobility modeling of PCS networks , 1999, IEEE Trans. Commun..
[52] Christel Baier,et al. Model-Checking Algorithms for Continuous-Time Markov Chains , 2002, IEEE Trans. Software Eng..
[53] Lars Grunske,et al. Software Architecture Optimization Methods: A Systematic Literature Review , 2013, IEEE Transactions on Software Engineering.
[54] K. Kwong,et al. On singular multivariate normal distribution and its applications , 1996 .
[55] Adele H. Marshall,et al. Simulating Coxian phase-type distributions for patient survival , 2009, Int. Trans. Oper. Res..
[56] Radu Calinescu,et al. Self-adaptive Software with Decentralised Control Loops , 2015, FASE.
[57] Lijun Zhang,et al. PARAM: A Model Checker for Parametric Markov Models , 2010, CAV.
[58] Amir Pnueli,et al. A compositional approach to CTL* verification , 2005, Theor. Comput. Sci..
[59] Muffy Calder,et al. Probabilistic Model Checking of DTMC Models of User Activity Patterns , 2014, QEST.
[60] Sebastian Junges,et al. PROPhESY: A PRObabilistic ParamEter SYnthesis Tool , 2015, CAV.
[61] Murali Sitaraman,et al. Foundations of component-based systems , 2000 .
[62] Lev V. Utkin,et al. Interval-Valued Finite Markov Chains , 2002, Reliab. Comput..
[63] Edmund M. Clarke,et al. Using Branching Time Temporal Logic to Synthesize Synchronization Skeletons , 1982, Sci. Comput. Program..
[64] Peter Buchholz,et al. A Novel Approach for Phase-Type Fitting with the EM Algorithm , 2006, IEEE Transactions on Dependable and Secure Computing.
[65] Edmund M. Clarke,et al. Counterexample-guided abstraction refinement , 2003, 10th International Symposium on Temporal Representation and Reasoning, 2003 and Fourth International Conference on Temporal Logic. Proceedings..
[66] Gabriel Ciobanu,et al. PHASE: A Stochastic Formalism for Phase-Type Distributions , 2014, ICFEM.
[67] Axel Legay,et al. Statistical Model Checking: An Overview , 2010, RV.
[68] David W. Chadwick,et al. Self-adaptive federated authorization infrastructures , 2014, J. Comput. Syst. Sci..
[69] Philipp Reinecke,et al. Phase-Type Fitting Using HyperStar , 2013, EPEW.
[70] A. Horváth,et al. Approximating heavy tailed behaviour with Phase type distributions , 2000 .
[71] L. A. Goodman. On Simultaneous Confidence Intervals for Multinomial Proportions , 1965 .
[72] Robert K. Brayton,et al. Verifying Continuous Time Markov Chains , 1996, CAV.
[73] Kim G. Larsen,et al. Testing Real-Time Systems Using UPPAAL , 2008, Formal Methods and Testing.
[74] Malek Ben Salem,et al. A Survey of Insider Attack Detection Research , 2008, Insider Attack and Cyber Security.
[75] Carlo Ghezzi,et al. Run-time efficient probabilistic model checking , 2011, 2011 33rd International Conference on Software Engineering (ICSE).
[76] Holger Hermanns,et al. Continuous-Time Markov Decisions based on Partial Exploration , 2018, ATVA.
[77] Alberto L. Sangiovanni-Vincentelli,et al. Polynomial-Time Verification of PCTL Properties of MDPs with Convex Uncertainties , 2013, CAV.
[78] Carlo Ghezzi,et al. Ariadne: Topology Aware Adaptive Security for Cyber-Physical Systems , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.
[79] Wil M. P. van der Aalst,et al. Process Flexibility: A Survey of Contemporary Approaches , 2008, CIAO! / EOMAS.
[80] G. Cumming,et al. The New Statistics , 2014, Psychological science.
[81] Jeff Magee,et al. Self-Managed Systems: an Architectural Challenge , 2007, Future of Software Engineering (FOSE '07).
[82] K. Gopinath,et al. Are Markov Models Effective for Storage Reliability Modelling? , 2015, ArXiv.
[83] Raffaela Mirandola,et al. QoS and energy management with Petri nets: A self-adaptive framework , 2012, J. Syst. Softw..
[84] Dawn M. Cappelli,et al. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes , 2012 .
[85] Helmut Veith,et al. Progress on the State Explosion Problem in Model Checking , 2001, Informatics.
[86] Edmund M. Clarke,et al. Compositional model checking , 1989, [1989] Proceedings. Fourth Annual Symposium on Logic in Computer Science.
[87] Song Zhi-gang. Role Based Access Control in MIS , 2002 .
[88] Radu Calinescu,et al. Using observation ageing to improve markovian model learning in QoS engineering , 2011, ICPE '11.
[89] Carlo Ghezzi,et al. Change-point detection for black-box services , 2010, FSE '10.
[90] Gul A. Agha,et al. A Survey of Statistical Model Checking , 2018, ACM Trans. Model. Comput. Simul..
[91] A. David,et al. The least variable phase type distribution is Erlang , 1987 .
[92] David S. Rosenblum,et al. Asymptotic Bounds for Quantitative Verification of Perturbed Probabilistic Systems , 2013, ICFEM.
[93] Yuguang Fang,et al. Hyper-Erlang Distribution Model and its Application in Wireless Mobile Networks , 2001, Wirel. Networks.
[94] Carlo Ghezzi,et al. Topology aware adaptive security , 2014, SEAMS 2014.
[95] Tadashi Dohi,et al. Communications in Statistics-Simulation and Computation , 2014 .
[96] Moshe Shaked,et al. Phase Type Distributions , 2004 .
[97] C. O'Cinneide. Phase-type distributions: open problems and a few properties , 1999 .
[98] Juan A. Carrasco. Computationally Efficient and Numerically Stable Reliability Bounds for Repairable Fault-Tolerant Systems , 2002, IEEE Trans. Computers.
[99] Raffaela Mirandola,et al. Hybrid multi-attribute QoS optimization in component based software systems , 2013, J. Syst. Softw..
[100] Carlo Ghezzi,et al. Model evolution by run-time parameter adaptation , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[101] D. C. Hurst,et al. Large Sample Simultaneous Confidence Intervals for Multinomial Proportions , 1964 .
[102] Christel Baier,et al. Approximate Symbolic Model Checking of Continuous-Time Markov Chains , 1999, CONCUR.
[103] Håkan L. S. Younes. Ymer: A Statistical Model Checker , 2005, CAV.
[104] A. Prasad Sistla,et al. Automatic verification of finite state concurrent system using temporal logic specifications: a practical approach , 1983, POPL '83.
[105] Carlo Ghezzi,et al. A formal approach to adaptive software: continuous assurance of non-functional requirements , 2011, Formal Aspects of Computing.
[106] Ravi S. Sandhu,et al. An Attribute Based Framework for Risk-Adaptive Access Control Models , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[107] Radu Calinescu,et al. Developing self-verifying service-based systems , 2013, 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[108] Gerard J. Holzmann,et al. The Model Checker SPIN , 1997, IEEE Trans. Software Eng..
[109] Marta Kwiatkowska,et al. Advances and challenges of probabilistic model checking , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[110] Joseph Sifakis,et al. Specification and verification of concurrent systems in CESAR , 1982, Symposium on Programming.
[111] Philipp Reinecke,et al. Cluster-based fitting of phase-type distributions to empirical data , 2012, Comput. Math. Appl..
[112] Muhammad Kumail Haider,et al. Markovian Models for Electrical Load Prediction in Smart Buildings , 2012, ICONIP.
[113] Tadashi Dohi,et al. A Variational Bayesian Approach for Estimating Parameters of a Mixture of Erlang Distribution , 2010 .
[114] Kathleen V. Diegert,et al. Error and uncertainty in modeling and simulation , 2002, Reliab. Eng. Syst. Saf..
[115] Bengt Jonsson,et al. A logic for reasoning about time and reliability , 1990, Formal Aspects of Computing.
[116] Radu Calinescu,et al. Observation-Enhanced QoS Analysis of Component-Based Systems , 2018, IEEE Transactions on Software Engineering.
[117] Ren Asmussen,et al. Fitting Phase-type Distributions via the EM Algorithm , 1996 .
[118] Conrado Daws. Symbolic and Parametric Model Checking of Discrete-Time Markov Chains , 2004, ICTAC.
[119] Hiroyuki Okamura,et al. Fitting Phase-Type Distributions and Markovian Arrival Processes: Algorithms and Tools , 2016 .
[120] Wang Yi,et al. UPPAAL 4.0 , 2006, Third International Conference on the Quantitative Evaluation of Systems - (QEST'06).
[121] Taolue Chen,et al. On the complexity of model checking interval-valued discrete time Markov chains , 2013, Inf. Process. Lett..
[122] Ramesh Bharadwaj,et al. Applying the SCR Requirements Specification Method to Practical Systems: A Case Study , 1996 .
[123] A. Horváth,et al. Matching Three Moments with Minimal Acyclic Phase Type Distributions , 2005 .
[124] Mark Fackrell,et al. Modelling healthcare systems with phase-type distributions , 2009, Health care management science.
[125] Marta Z. Kwiatkowska,et al. Advances in Probabilistic Model Checking , 2012, Software Safety and Security.
[126] Marin Litoiu,et al. Performance Model Estimation and Tracking Using Optimal Filters , 2008, IEEE Transactions on Software Engineering.
[127] Marco Ajmone Marsan,et al. Modelling with Generalized Stochastic Petri Nets , 1995, PERV.
[128] Vojtech Rehák,et al. Dealing with Zero Density Using Piecewise Phase-Type Approximation , 2014, EPEW.
[129] Radu Calinescu,et al. Adaptive model learning for continual verification of non-functional properties , 2014, ICPE.
[130] Eva Ishay,et al. Fitting Phase-Type Distributions to Data from a Telephone Call Center , 2002 .
[131] Carlo Ghezzi,et al. Quality Prediction of Service Compositions through Probabilistic Model Checking , 2008, QoSA.
[132] T. W. Anderson,et al. Statistical Inference about Markov Chains , 1957 .
[133] Joseph Sifakis,et al. Model checking , 1996, Handbook of Automated Reasoning.
[134] Radu Calinescu. Model-Driven Autonomic Architecture , 2007, Fourth International Conference on Autonomic Computing (ICAC'07).
[135] C. Murray Woodside,et al. Enhanced Modeling and Solution of Layered Queueing Networks , 2009, IEEE Transactions on Software Engineering.
[136] Petr Novotný,et al. Optimizing Performance of Continuous-Time Stochastic Systems using Timeout Synthesis , 2014, QEST.
[137] Radu Calinescu,et al. FACT: A Probabilistic Model Checker for Formal Verification with Confidence Intervals , 2016, TACAS.
[138] Radu Calinescu,et al. Search-Based Synthesis of Probabilistic Models for Quality-of-Service Software Engineering (T) , 2015, 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[139] Andrea Polini,et al. Business Processes Verification for e-Government Service Delivery , 2010, Inf. Syst. Manag..
[140] Marta Z. Kwiatkowska,et al. Stochastic Model Checking , 2007, SFM.
[141] Sadie Creese,et al. Automated Insider Threat Detection System Using User and Role-Based Profile Assessment , 2017, IEEE Systems Journal.
[142] Luis E. Mendoza Morales,et al. Business process verification using a Formal Compositional Approach and Timed Automata , 2013, 2013 XXXIX Latin American Computing Conference (CLEI).
[143] Lars Grunske,et al. Evaluating probabilistic models with uncertain model parameters , 2012, Software & Systems Modeling.
[144] Joost-Pieter Katoen,et al. How Fast and Fat Is Your Probabilistic Model Checker? An Experimental Performance Comparison , 2007, Haifa Verification Conference.
[145] Marta Z. Kwiatkowska,et al. PRISM 4.0: Verification of Probabilistic Real-Time Systems , 2011, CAV.
[146] Joost-Pieter Katoen,et al. Beyond Memoryless Distributions: Model Checking Semi-Markov Chains , 2001, PAPM-PROBMIV.
[147] Mahesh Viswanathan,et al. Statistical Model Checking of Black-Box Probabilistic Systems , 2004, CAV.
[148] Marta Z. Kwiatkowska,et al. PRISM: Probabilistic Symbolic Model Checker , 2002, Computer Performance Evaluation / TOOLS.
[149] Maria E. Orlowska,et al. Pockets of Flexibility in Workflow Specification , 2001, ER.
[150] Radu Calinescu,et al. Efficient Parametric Model Checking Using Domain-Specific Modelling Patterns , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering: New Ideas and Emerging Technologies Results (ICSE-NIER).
[151] Peter A. Lindsay,et al. Formal analysis of human-computer interaction using model-checking , 2005, Third IEEE International Conference on Software Engineering and Formal Methods (SEFM'05).
[152] Kenneth L. McMillan,et al. The SMV System , 1993 .
[153] Hongyang Qu,et al. Assume-Guarantee Verification for Probabilistic Systems , 2010, TACAS.
[154] Radu Calinescu,et al. Accurate Analysis of Quality Properties of Software with Observation-Based Markov Chain Refinement , 2017, 2017 IEEE International Conference on Software Architecture (ICSA).