Sciweavers

30 search results - page 6 / 6
» Neutrality and Many-Valued Logics
Sort
View
IEEESCC
2007
IEEE
13 years 12 months ago
Deriving executable BPEL from UMM Business Transactions
UN/CEFACT’s Modeling Methodology (UMM) is a UML profile for modeling global B2B choreographies. The basic building blocks of UMM are business transactions, which describe the e...
Birgit Hofreiter, Christian Huemer, Philipp Liegl,...
ECOWS
2007
Springer
13 years 9 months ago
A Dynamic Reconfigurable Web Service Composition Framework Using Reo Coordination Language
Web services are self-contained, modular units of application logic which provide business functionality to other applications via Internet connections. Several models have been u...
Soheil Saifipoor, Behrouz Tork Ladani, Naser Nemat...
ATAL
2008
Springer
13 years 7 months ago
WADE: a software platform to develop mission critical applications exploiting agents and workflows
In this paper, we describe two mission critical applications currently deployed by Telecom Italia in the Operations Support System domains. The first one called "Network Neut...
Giovanni Caire, Danilo Gotta, Massimo Banzi
PIMRC
2010
IEEE
13 years 3 months ago
An implementation of Cognitive Resource Management on LTE platform
Abstract--In this paper we describe an LTE based demonstrator of the Universal Link Layer API (ULLA) and Cognitive Resource Manager (CRM) modules that are developed in ARAGORN proj...
Tao Cai, Georgios P. Koudouridis, Johan Johansson,...
ISSTA
2009
ACM
14 years 3 days ago
Exception analysis and points-to analysis: better together
Exception analysis and points-to analysis are typically done in complete separation. Past algorithms for precise exception analysis (e.g., pairing throw clauses with catch stateme...
Martin Bravenboer, Yannis Smaragdakis