Sciweavers

466 search results - page 16 / 94
» A Theory of Rate-Based Execution
Sort
View
RTA
2005
Springer
15 years 3 months ago
Intruder Deduction for AC-Like Equational Theories with Homomorphisms
Cryptographic protocols are small programs which involve a high level of concurrency and which are difficult to analyze by hand. The most successful methods to verify such protocol...
Pascal Lafourcade, Denis Lugiez, Ralf Treinen
SEKE
2005
Springer
15 years 3 months ago
Application of Design Combinatorial Theory to Scenario-Based Software Architecture Analysis
Design combinatorial theory for test-case generation has been used successfully in the past. It is useful in optimizing test cases as it is practically impossible to exhaustively t...
Chung-Horng Lung, Marzia Zaman
AGENTS
1997
Springer
15 years 1 months ago
Decision Making and Plan Management by Autonomous Agents: Theory, Implementation and Applications
A generic architecture for autonomous agents is presented. In commonwith other current proposals the agent is capable of reacting to and reasoning about events which occur in its ...
Subrata Kumar Das, John Fox, D. Elsdon, Peter Hamm...
MISQ
2002
111views more  MISQ 2002»
14 years 9 months ago
A Design Theory for Systems That Support Emergent Knowledge Processes
This paper addresses the design problem of providing IT support for emerging knowledge processes (EKPs). EKPs are organizational activity patterns that exhibit three characteristi...
M. Lynne Markus, Ann Majchrzak, Les Gasser

Publication
232views
16 years 7 months ago
Multi-stage Programming:  Its Theory and Applications
MetaML is a statically typed functional programming language with special support for program generation. In addition to providing the standard features of contemporary programming...
Walid Taha