Sciweavers

3909 search results - page 276 / 782
» Extreme Model Checking
Sort
View
128
Voted
FORTE
2007
15 years 4 months ago
Transactional Reduction of Component Compositions
Behavioural protocols are beneficial to Component-Based Software Engineering and Service-Oriented Computing as they foster automatic procedures for discovery, composition, composi...
Serge Haddad, Pascal Poizat
EUMAS
2006
15 years 4 months ago
A Metamodel for Verifying Institutions
To investigate the interdependencies existing among deontic positions (like powers and obligations) and the ontology defined by an institution, we have proposed to model instituti...
Francesco Viganò
IAJIT
2008
94views more  IAJIT 2008»
15 years 3 months ago
Enforcing User-Defined Constraints during the Run-Time in OODB
: In this paper a run-time model is proposed. The run-time model enforces integrity constraints for attributes that are derived from composition and inheritance hierarchies. The ru...
Belal Zaqaibeh, Hamidah Ibrahim, Ali Mamat, Md Nas...
194
Voted
ICRA
2010
IEEE
194views Robotics» more  ICRA 2010»
15 years 1 months ago
Continuous collision detection for non-rigid contact computations using local advancement
Abstract— We present a novel algorithm to perform continuous collision detection(CCD) between non-rigid, deformable models using local advancement. Given the initial and final c...
Min Tang, Young J. Kim, Dinesh Manocha
ACSAC
2002
IEEE
15 years 8 months ago
Representing TCP/IP Connectivity For Topological Analysis of Network Security
The individual vulnerabilities of hosts on a network can be combined by an attacker to gain access that would not be possible if the hosts were not interconnected. Currently avail...
Ronald W. Ritchey, Brian O'Berry, Steven Noel