Polynomial reachability witnesses via Stellensätze
We consider the fundamental problem of reachability analysis over imperative programs
with real variables. Previous works that tackle reachability are either unable to handle …
with real variables. Previous works that tackle reachability are either unable to handle …
[HTML][HTML] Characterization and complexity results on jumping finite automata
In a jumping finite automaton, the input head can jump to an arbitrary position within the
remaining input after reading and consuming a symbol. We characterize the corresponding …
remaining input after reading and consuming a symbol. We characterize the corresponding …
[HTML][HTML] On the complexity of resource-bounded logics
We revisit decidability results for resource-bounded logics and use decision problems on
vector addition systems with states (VASS) in order to establish complexity characterisations …
vector addition systems with states (VASS) in order to establish complexity characterisations …
On the complexity of resource-bounded logics
We revisit decidability results for resource-bounded logics and use decision problems for
vector addition systems with states (VASS) to characterise the complexity of (decidable) …
vector addition systems with states (VASS) to characterise the complexity of (decidable) …
An automated framework for BPMN model verification achieving branch coverage
BPMN model is used in software development process that the procedural logics of software
are described in term of graphical representation. Formal verification using colored Petri net …
are described in term of graphical representation. Formal verification using colored Petri net …
Towards unobtrusive patient‐centric access‐control for Health Information System
MA de Carvalho Junior… - … Practice and Experience, 2020 - Wiley Online Library
Patient consent is currently a missing piece on Health Information Systems (HIS) access
permission. The control is needed to ensure personal data as the property of the individual …
permission. The control is needed to ensure personal data as the property of the individual …
Architecture and deployment of services of assistance to the person
M Darwish - 2016 - theses.hal.science
The ageing of the European population encouraged the community to search for solutions
tosupport this evolution. In this context, several issues (related to the expensive and limited …
tosupport this evolution. In this context, several issues (related to the expensive and limited …
Inductive reachability witnesses
In this work, we consider the fundamental problem of reachability analysis over imperative
programs with real variables. The reachability property requires that a program can reach …
programs with real variables. The reachability property requires that a program can reach …
Redes de Petri, algoritmo para la construcción de árboles de mínima cobertura
LO Ventre, M Orlando, G Venezuela… - Memorias de las …, 2024 - publicaciones.sadio.org.ar
En el ámbito del diseño de sistemas embebidos críticos, donde predominan las reacciones
a eventos y la lógica basada en acciones, las Redes de Petri emergen como una …
a eventos y la lógica basada en acciones, las Redes de Petri emergen como una …
Modeling the value chain with object-valued Petri nets
J Zacek, Z Melis, F Hunka - Computational Problems in Engineering, 2014 - Springer
A substantial part of the economic theories is based on conversion and exchange process.
These processes can be arranged in a value chain, which can be considered as a cyclic …
These processes can be arranged in a value chain, which can be considered as a cyclic …