Sciweavers

1585 search results - page 137 / 317
» A framework for computer-aided validation
Sort
View
EJIS
2007
150views more  EJIS 2007»
15 years 3 months ago
e-Government information systems: Evaluation-led design for public value and client trust
e-Government systems differ from commercial information systems (IS) in that they frequently encompass strategic goals that go beyond efficiency, effectiveness and economy, and in...
Michael Grimsley, Anthony Meehan
ENTCS
2007
121views more  ENTCS 2007»
15 years 3 months ago
Incremental Parametric Development of Greedy Algorithms
The event B method provides a general framework for modelling both data structures and algorithms. B models are validated by discharging proof obligations ensuring safety properti...
Dominique Cansell, Dominique Méry
141
Voted
JUCS
2006
131views more  JUCS 2006»
15 years 3 months ago
Verification of CRWL Programs with Rewriting Logic
Abstract: We present a novel approach to the verification of functional-logic programs. For our verification purposes, equational reasoning is not valid due to the presence of non-...
José Miguel Cleva, Isabel Pita
IJCIM
2007
122views more  IJCIM 2007»
15 years 3 months ago
Implementation approach of ERP with mass customization
: This paper analyzes the shortage of traditional ERP systems in the current dynamic and competitive enterprises environment. The new generation ERP system needs to be frequently c...
Y. Zhao, Y. S. Fan
122
Voted
INFOCOM
2010
IEEE
15 years 1 months ago
How do Superpeer Networks Emerge?
—In this paper, we develop an analytical framework which explains the emergence of superpeer networks on execution of the commercial peer-to-peer bootstrapping protocols by incom...
Bivas Mitra, Abhishek Kumar Dubey, Sujoy Ghose, Ni...