Sciweavers

4386 search results - page 435 / 878
» A Tamper-Resistant Programming Language System
Sort
View
IFIP
1994
Springer
15 years 8 months ago
The specification of business rules: A comparison of selected methodologies
Business rules are an important element of information systems. The notion business rule encompasses different phenomena; therefore, some classification criteria are presented and...
Holger Herbst, Gerhard Knolmayer, Thomas Myrach, M...
EDBTW
2006
Springer
15 years 8 months ago
Twelve Theses on Reactive Rules for the Web
Reactivity, the ability to detect and react to events, is an essential functionality in many information systems. In particular, Web systems such as online marketplaces, adaptive (...
François Bry, Michael Eckert
ICALP
2000
Springer
15 years 8 months ago
A Matrix-based Method for Analysing Stochastic Process Algebras
This paper demonstrates how three stochastic process algebras can be mapped on to a generally-distributed stochastic transition system. We demonstrate an aggregation technique on ...
Jeremy T. Bradley, N. J. Davies
IFIP
2010
Springer
15 years 1 months ago
Supporting DSS Acceptability through a User-Centered Design Methodology: Experiences in Emergency Management
This paper presents a user-centered design methodology for Decision Support Systems (DSSs), which is specifically built to face the socio-technical gap that often impedes DSS accep...
Pietro Baroni, Daniela Fogli, Massimiliano Giacomi...
IFIP
2010
Springer
14 years 11 months ago
Secrecy and Authenticity Types for Secure Distributed Messaging
Abstract. We introduce a calculus with mobile names, distributed principals and primitives for secure remote communication, without any reference to explicit cryptography. The calc...
Michele Bugliesi, Stefano Calzavara, Damiano Maced...