Sciweavers

262 search results - page 49 / 53
» Hybrid Constraints in Automated Model Synthesis and Model Pr...
Sort
View
CADE
2005
Springer
15 years 9 months ago
Privacy-Sensitive Information Flow with JML
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
Guillaume Dufay, Amy P. Felty, Stan Matwin
WSC
2004
14 years 10 months ago
Estimating Efficacy of Progressive Planning for Air Traffic Flow Management
Air traffic flow management (TFM) is a set of processes and procedures which seek to balance the demand for airspace resources with the capacity of these resources. Examples of re...
Lynne Fellman, James S. DeArmon, Kelly A. Connolly
CASES
2006
ACM
15 years 3 months ago
Extensible control architectures
Architectural advances of modern systems has often been at odds with control complexity, requiring significant effort in both design and verification. This is particularly true ...
Greg Hoover, Forrest Brewer, Timothy Sherwood
ICEBE
2005
IEEE
165views Business» more  ICEBE 2005»
15 years 3 months ago
Distributed Policy Specification and Enforcement in Service-Oriented Business Systems
Service-Oriented Computing (SOC) and Web Services (WS) provide a flexible computing platform for electronic business and commerce. Introducing policy-based computing to service-or...
Wei-Tek Tsai, Xinxin Liu, Yinong Chen
WISE
2003
Springer
15 years 2 months ago
Ontology Generation from Tables
At the heart of today’s information-explosion problems are issues involving semantics, mutual understanding, concept matching, and interoperability. Ontologies and the Semantic ...
Yuri A. Tijerino, David W. Embley, Deryle W. Lonsd...