Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    A Better Understanding of Machine Learning Malware Misclassifcation

    Machine learning-based malware detection systems have been widely suggested and used as a replacement for signature-based detection methods. Such systems have shown that they can provide a high detection rate ...

    Nada Alruhaily, Tom Chothia, Behzad Bordbar in Information Systems Security and Privacy (2018)

  2. No Access

    Chapter and Conference Paper

    A Logical Approach for Behavioural Composition of Scenario-Based Models

    As modern systems become more complex, design approaches model different aspects of the system separately. When considering (intra and inter) system interactions, it is usual to model individual scenarios usin...

    Juliana Küster Filipe Bowles, Behzad Bordbar in Formal Methods and Software Engineering (2015)

  3. No Access

    Chapter and Conference Paper

    Opening the Black-Box of Model Transformation

    The automated execution of model transformation plays a key role within Model Driven Development. The software that executes a transformation, commonly known as a transformation engine, receives the meta-model...

    John T. Saxon, Behzad Bordbar, David H. Akehurst in Modelling Foundations and Applications (2015)

  4. No Access

    Article

    A modelling approach to Service oriented Architecture for on-line diagnosis

    Failure diagnosis is one of the key challenges of Service oriented Architectures. One of the methods of identifying occurrences of failure is to use Diagnosers; software modules or services are deployed with t...

    Mohammed Alodib, Behzad Bordbar in Service Oriented Computing and Applications (2012)

  5. No Access

    Chapter and Conference Paper

    Transformation of Spatio-Temporal Role Based Access Control Specification to Alloy

    The recent advances in wireless networks, mobile applications and pervasive computing has prompted an urgent need for the creation of Access Control systems which takes into consideration the location of the u...

    Emsaieb Geepalla, Behzad Bordbar, Joel Last in Model and Data Engineering (2012)

  6. No Access

    Chapter and Conference Paper

    Resolving Syntactic Ambiguities in Natural Language Specification of Constraints

    In the NL2OCL project, we aim to translate English specification of software constraints to formal constraints such as OCL (Object Constraint Language). In the used approach, the Stanford POS tagger and the St...

    Imran Sarwar Bajwa, Mark Lee, Behzad Bordbar in Computational Linguistics and Intelligent … (2012)

  7. No Access

    Book and Conference Proceedings

    Modelling Foundations and Applications

    7th European Conference, ECMFA 2011, Birmingham, UK, June 6 - 9, 2011 Proceedings

    Robert B. France, Jochen M. Kuester in Lecture Notes in Computer Science (2011)

  8. No Access

    Chapter and Conference Paper

    A Principled Approach to the Analysis of Process Mining Algorithms

    Process mining uses event logs to learn and reason about business process models. Existing algorithms for mining the control-flow of processes in general do not take into account the probabilistic nature of th...

    Phil Weber, Behzad Bordbar, Peter Tiňo in Intelligent Data Engineering and Automated… (2011)

  9. Chapter and Conference Paper

    Pattern Tool Support to Guide Interface Design

    Design patterns have proved very helpful in encapsulating the knowledge required for solving design related problems, and have found their way into the CHI domain. Many interface patterns can be formalised and...

    Russell Beale, Behzad Bordbar in Human-Computer Interaction – INTERACT 2011 (2011)

  10. No Access

    Article

    On challenges of model transformation from UML to Alloy

    The Unified Modeling Language (UML) is the de facto language used in the industry for software specifications. Once an application has been specified, Model Driven Architecture (MDA) techniques can be applied ...

    Kyriakos Anastasakis, Behzad Bordbar, Geri Georg in Software & Systems Modeling (2010)

  11. No Access

    Chapter and Conference Paper

    From UML to Alloy and Back Again

    Model transformations can be used to bridge the gap between design and analysis technical spaces by creating tools that allow a model produced by a designer to be transformed to a model suitable for conducting au...

    Seyyed M. A. Shah, Kyriakos Anastasakis, Behzad Bordbar in Models in Software Engineering (2010)

  12. No Access

    Chapter and Conference Paper

    A Model Driven Approach to the Analysis of Timeliness Properties

    The need for a design language that is rigorous but accessible and intuitive is often at odds with the formal and mathematical nature of languages used for analysis. UML and Petri Nets are a good example of th...

    Mohamed A. Ameedeen, Behzad Bordbar in Model Driven Architecture - Foundations an… (2009)

  13. No Access

    Article

    On-Line Monitoring of Large Petri Net Models Under Partial Observation

    We consider a Petri Net model of the plant. The observation is given by a subset of transitions whose occurrence is always and immediately sensed by a monitoring agent. Other transitions not in this subset are...

    George Jiroveanu, René K. Boel, Behzad Bordbar in Discrete Event Dynamic Systems (2008)

  14. Chapter and Conference Paper

    A Pattern-Based Approach to Business Process Modeling and Implementation in Web Services

    There are often three groups of experts involved in the design and implementation of business processes in a service oriented enterprise; business analysts, solution architects and system developers. They collabo...

    Steen Brahe, Behzad Bordbar in Service-Oriented Computing ICSOC 2006 (2007)

  15. No Access

    Chapter and Conference Paper

    Model Transformation from OWL-S to BPEL Via SiTra

    Although there are a large number of academic and industrial model transformation frameworks available, allowing specification, implementation, maintenance and documentation of model transformations which prov...

    Behzad Bordbar, Gareth Howells in Model Driven Architecture- Foundations and… (2007)

  16. No Access

    Chapter and Conference Paper

    UML2Alloy: A Challenging Model Transformation

    Alloy is a formal language, which has been applied to modelling of systems in a wide range of application domains. It is supported by Alloy Analyzer, a tool, which allows fully automated analysis. As a result,...

    Kyriakos Anastasakis, Behzad Bordbar in Model Driven Engineering Languages and Sys… (2007)

  17. No Access

    Chapter and Conference Paper

    MDA and Analysis of Web Applications

    Enterprise systems are mission critical. As a result, ensuring their correctness is of primary concern. This paper aids to the analysis of Web applications, focusing on the aspects related to the interaction o...

    Behzad Bordbar, Kyriakos Anastasakis in Trends in Enterprise Application Architecture (2006)

  18. No Access

    Chapter and Conference Paper

    A Comparative Study of Metamodel Integration and Interoperability in UML and Web Services

    The application of MDA to Web services has recently received considerable attention. Similar to UML diagrams, Web services are specialised languages each one targeting a specific aspect and functionality of th...

    Athanasios Staikopoulos, Behzad Bordbar in Model Driven Architecture – Foundations an… (2005)

  19. No Access

    Chapter and Conference Paper

    Testing Deadlock-Freeness in Real-Time Systems: A Formal Approach

    A Time Action Lock is a state of a Real-time system at which neither time can progress nor an action can occur. Time Action Locks are often seen as signs of errors in the model or inconsistencies in the specifica...

    Behzad Bordbar, Kozo Okano in Formal Approaches to Software Testing (2005)

  20. No Access

    Chapter and Conference Paper

    Integrated Model-Based Software Development, Data Access, and Data Migration

    In this paper we describe a framework for robust system maintenance that addresses specific challenges of data-centric applications. We show that for data-centric applications, classical simultaneous roundtrip...

    Behzad Bordbar, Dirk Draheim, Matthias Horn in Model Driven Engineering Languages and Sys… (2005)

previous disabled Page of 2