Sciweavers

2558 search results - page 64 / 512
» Model Composition Contracts
Sort
View
139
Voted
JWSR
2008
98views more  JWSR 2008»
15 years 3 months ago
Mining and Improving Composite Web Services Recovery Mechanisms
: Ensuring composite services reliability is a challenging problem. Indeed, due to the inherent autonomy and heterogeneity of Web services it is difficult to predict and reason abo...
Sami Bhiri, Walid Gaaloul, Claude Godart
123
Voted
ICNP
1998
IEEE
15 years 8 months ago
A Proof Technique for Liveness Properties of Multifunction Composite Protocols
In protocol composition techniques, component protocols are combined in various ways to obtain a complex protocol whose execution sequences consist of interleaved execution sequen...
J. Park, R. Miller
130
Voted
CRYPTO
2005
Springer
164views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
Composition Does Not Imply Adaptive Security
We study the question whether the sequential or parallel composition of two functions, each indistinguishable from a random function by non-adaptive distinguishers is secure agains...
Krzysztof Pietrzak
137
Voted
ICMT
2009
Springer
15 years 10 months ago
Model Superimposition in Software Product Lines
In software product line engineering, feature composition generates software tailored to specific requirements from a common set of artifacts. Superimposition is a technique to me...
Sven Apel, Florian Janda, Salvador Trujillo, Chris...
106
Voted
COLING
2010
14 years 10 months ago
A Structured Vector Space Model for Hidden Attribute Meaning in Adjective-Noun Phrases
We present an approach to model hidden attributes in the compositional semantics of adjective-noun phrases in a distributional model. For the representation of adjective meanings,...
Matthias Hartung, Anette Frank