Sciweavers

3516 search results - page 517 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ICDE
2007
IEEE
155views Database» more  ICDE 2007»
15 years 10 months ago
Atomicity for P2P based XML Repositories
Over the years, the notion of transactions has become synonymous with providing fault-tolerance, reliability and robustness to database systems. However, challenges arise when we ...
Debmalya Biswas, Il-Gon Kim
KAIS
2000
131views more  KAIS 2000»
15 years 4 months ago
Intentions in the Coordinated Generation of Graphics and Text from Tabular Data
To use graphics efficiently in an automatic report generation system, one has to model messages and how they go from the writer (intention) to the reader (interpretation). This pap...
Massimo Fasciano, Guy Lapalme
AGENTS
2001
Springer
15 years 8 months ago
Principles of intention reconsideration
We present a framework that enables a belief-desire-intention (BDI) agent to dynamically choose its intention reconsideration policy in order to perform optimally in accordance wi...
Martijn C. Schut, Michael Wooldridge
EMSOFT
2007
Springer
15 years 10 months ago
The algebra of connectors: structuring interaction in BIP
We provide an algebraic formalisation of connectors in BIP. These are used to structure interactions in a component-based system. A connector relates a set of typed ports. Types a...
Simon Bliudze, Joseph Sifakis
HASKELL
2006
ACM
15 years 10 months ago
Strong types for relational databases
Haskell’s type system with multi-parameter constructor classes and functional dependencies allows static (compile-time) computations to be expressed by logic programming on the ...
Alexandra Silva, Joost Visser