Sciweavers

1463 search results - page 259 / 293
» Model Checking Implicit-Invocation Systems
Sort
View
RAID
2004
Springer
15 years 6 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
CLEF
2009
Springer
15 years 2 months ago
Information Retrieval Baselines for the ResPubliQA Task
This paper describes the baselines proposed for the ResPubliQA 2009 task. These baselines are purely based on information retrieval techniques. The selection of an adequate retrie...
Joaquín Pérez-Iglesias, Guillermo Ga...
JAIR
2000
96views more  JAIR 2000»
15 years 1 months ago
OBDD-based Universal Planning for Synchronized Agents in Non-Deterministic Domains
Recently model checking representation and search techniques were shown to be efciently applicable to planning, in particular to non-deterministic planning. Such planning approach...
Rune M. Jensen, Manuela M. Veloso
CAISE
2000
Springer
15 years 5 months ago
Design Principles for Application Integration
Application integration is a major trend in information technology today. In this paper we present a number of principles for the design, validation and presentation of process mod...
Paul Johannesson, Erik Perjons
ICWS
2008
IEEE
15 years 2 months ago
A Framework for Verifying SLA Compliance in Composed Services
Service level agreements (SLAs) impose many nonfunctional requirements on services. Business analysts specify and check these requirements in business process models using tools s...
Hua Xiao, Brian Chan, Ying Zou, Jay W. Benayon, Bi...