Sciweavers

354 search results - page 62 / 71
» Constraints of Behavioural Inheritance
Sort
View
TOOLS
2008
IEEE
15 years 3 months ago
Ownership, Uniqueness, and Immutability
Programming in an object-oriented language demands a fine balance between high degrees of expressiveness and control. At one level, we need to permit objects to interact freely t...
Johan Östlund, Tobias Wrigstad, Dave Clarke, ...
ARITH
2007
IEEE
15 years 3 months ago
Floating-point L2-approximations to functions
In the present paper, we investigate the approximation of a function by a polynomial with floating-point coefficients; we are looking for the best approximation in the L2 sense....
Nicolas Brisebarre, Guillaume Hanrot
COMPSAC
2007
IEEE
15 years 3 months ago
An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment
We present in this paper an adaptive security model for Multi-agent systems. A security meta-model has been developed in which the traditional role concept has been extended. The ...
Liang Xiao 0002, Andrew Peet, Paul H. Lewis, Srina...
IROS
2007
IEEE
134views Robotics» more  IROS 2007»
15 years 3 months ago
From path to trajectory deformation
Abstract— Path deformation is a technique that was introduced to generate robot motion wherein a path, that has been computed beforehand, is continuously deformed on-line in resp...
Hanna Kurniawati, Thierry Fraichard
BPM
2007
Springer
148views Business» more  BPM 2007»
15 years 3 months ago
Requirements-Driven Design and Configuration Management of Business Processes
The success of a business process (BP) depends on whether it meets its business goal as well as non-functional requirements associated with it. BP specifications frequently need to...
Alexei Lapouchnian, Yijun Yu, John Mylopoulos