Sciweavers

4498 search results - page 176 / 900
» How to Invent Functions
Sort
View
FM
2005
Springer
88views Formal Methods» more  FM 2005»
15 years 9 months ago
Timing Tolerances in Safety-Critical Software
Many safety-critical software applications are hard real-time systems. They have stringent timing requirements that have to be met. We present a description of timing behaviour tha...
Alan Wassyng, Mark Lawford, Xiayong Hu
ICSOC
2005
Springer
15 years 9 months ago
ASTRO: Supporting Composition and Execution of Web Services
Web services are rapidly emerging as the reference paradigm for the interaction and coordination of distributed business processes. In several research papers we have shown how ad...
Michele Trainotti, Marco Pistore, Gaetano Calabres...
MPC
2004
Springer
155views Mathematics» more  MPC 2004»
15 years 9 months ago
Inferring Type Isomorphisms Generically
Abstract. Datatypes which differ inessentially in their names and structure are said to be isomorphic; for example, a ternary product is isomorphic to a nested pair of binary prod...
Frank Atanassow, Johan Jeuring
AMFG
2003
IEEE
113views Biometrics» more  AMFG 2003»
15 years 9 months ago
Sequential Monte Carlo Tracking of Body Parameters in a Sub-Space
In recent years Sequential Monte Carlo (SMC) methods have been applied to handle some of the problems inherent to model-based tracking. In this paper two issues regarding SMC are ...
Thomas B. Moeslund, Erik Granum
CCS
2003
ACM
15 years 9 months ago
Formal access control analysis in the software development process
Security is a crucial aspect in any modern software system. To ensure security in the final product, security requirements must be considered in the entire software development p...
Manuel Koch, Francesco Parisi-Presicce