Sciweavers

8008 search results - page 259 / 1602
» Computer-Aided Language Processing
Sort
View
134
Voted
IFIP
2009
Springer
15 years 1 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
92
Voted
CICLING
2009
Springer
15 years 10 months ago
Evaluation of the Syntactic Annotation in EPEC, the Reference Corpus for the Processing of Basque
The aim of this work is to evaluate the dependency-based annotation of EPEC (the Reference Corpus for the Processing of Basque) by means of an experiment: two annotators have synta...
Larraitz Uria, Ainara Estarrona, Izaskun Aldezabal...
PROFES
2001
Springer
15 years 7 months ago
Describing Fractal Processes with UML
Component-based software has a self-similar structure on el of abstraction, i.e. its structure is fractal. Traditional software processes, however, have a linear or iterated struct...
Harald Störrle
LICS
1992
IEEE
15 years 7 months ago
Asynchronous Communication in Process Algebra
d Abstract) Frank S. de Boer, Jan Willem Klopyz , Catuscia Palamidessiyx We study the paradigm of asynchronous process communication, as contrasted with the synchronous communicat...
Frank S. de Boer, Jan Willem Klop, Catuscia Palami...
ICALP
2000
Springer
15 years 7 months ago
A Matrix-based Method for Analysing Stochastic Process Algebras
This paper demonstrates how three stochastic process algebras can be mapped on to a generally-distributed stochastic transition system. We demonstrate an aggregation technique on ...
Jeremy T. Bradley, N. J. Davies