Sciweavers

4919 search results - page 876 / 984
» A Process-Ontological Model for Software Engineering
Sort
View
FOSSACS
2005
Springer
15 years 3 months ago
History-Based Access Control with Local Policies
Abstract. An extension of the λ-calculus is proposed, to study historybased access control. It allows for security policies with a possibly nested, local scope. We define a type ...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
FSTTCS
2005
Springer
15 years 3 months ago
When Are Timed Automata Weakly Timed Bisimilar to Time Petri Nets?
In this paper4 , we compare Timed Automata (TA) and Time Petri Nets (TPN) with respect to weak timed bisimilarity. It is already known that the class of bounded TPNs is strictly in...
Béatrice Bérard, Franck Cassez, Serg...
GECCO
2005
Springer
135views Optimization» more  GECCO 2005»
15 years 3 months ago
Dynamic optimization of migration topology in internet-based distributed genetic algorithms
Distributed Genetic Algorithms (DGAs) designed for the Internet have to take its high communication cost into consideration. For island model GAs, the migration topology has a maj...
Johan Berntsson, Maolin Tang
ICESS
2005
Springer
15 years 3 months ago
Swarm Based Sensor Deployment Optimization in Ad Hoc Sensor Networks
Abstract. In ad hoc sensor networks, sensor nodes have very limited energy resources, thus energy consuming operations such as data collection, transmission and reception must be k...
Xiaoling Wu, Shu Lei, Jie Yang, Hui Xu, Jinsung Ch...
SERA
2005
Springer
15 years 3 months ago
Bridging the Gap between Analysis and Design Using Dependency Diagrams
Requirements specifications often make use of a number of scenarios that are interrelated and that depend on each other in many ways. However, they are often treated separately, o...
Simona Vasilache, Jiro Tanaka