Sciweavers

793 search results - page 70 / 159
» Argumentation and standards of proof
Sort
View
115
Voted
EJIS
2011
118views more  EJIS 2011»
14 years 7 months ago
A response to the design-oriented information systems research memorandum
In response to O¨ sterle et al.’s ‘Memorandum on Design Oriented Information Systems Research’, this commentary disputes, and expands the context of, several premises used ...
Richard Baskerville, Kalle Lyytinen, Vallabh Samba...
98
Voted
SP
2006
IEEE
136views Security Privacy» more  SP 2006»
15 years 6 months ago
Simulatable Security and Polynomially Bounded Concurrent Composability
Simulatable security is a security notion for multi-party protocols that implies strong composability features. The main definitional flavours of simulatable security are standa...
Dennis Hofheinz, Dominique Unruh
92
Voted
FORTE
1996
15 years 2 months ago
Applications of Fair Testing
In this paper we present the application of the fair testing pre-order, introduced in a previous paper, to the speci cation and analysis of distributed systems. This pre-order com...
Ed Brinksma, Arend Rensink, Walter Vogler
ENTCS
2000
80views more  ENTCS 2000»
15 years 16 days ago
Behavioral and Coinductive Rewriting
Behavioral rewriting di ers from standard rewriting in taking account of the weaker inference rules of behavioral logic, but it shares much with standard rewriting, including noti...
Joseph A. Goguen, Kai Lin, Grigore Rosu
91
Voted
BIRTHDAY
2009
Springer
15 years 7 months ago
Nonassociative Lambek Calculus with Additives and Context-Free Languages
We study Nonassociative Lambek Calculus with additives ∧, ∨, satisfying the distributive law (Distributive Full Nonassociative Lambek Calculus DFNL). We prove that categorial g...
Wojciech Buszkowski, Maciej Farulewski