Sciweavers

670 search results - page 78 / 134
» Modeling generalized implicatures using non-monotonic logics
Sort
View
DBSEC
2008
136views Database» more  DBSEC 2008»
15 years 1 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
SFP
2004
15 years 1 months ago
Disjoint forms in graphical user interfaces
Abstract: Forms are parts of a graphical user interface (GUI) that show a (structured) value and allow the user to update it. Some forms express a choice between two or more (struc...
Sander Evers, Peter Achten, Rinus Plasmeijer
ECOWS
2008
Springer
15 years 1 months ago
Beyond Soundness: On the Semantic Consistency of Executable Process Models
Executable business process models build on the specification of process activities, their implemented business functions (e.g., Web services) and the control flow between these a...
Ingo Weber, Jörg Hoffmann, Jan Mendling
GRID
2006
Springer
14 years 12 months ago
Campus Grids Meet Applications: Modeling, Metascheduling and Integration
Air Quality Forecasting (AQF) is a new discipline that attempts to reliably predict atmospheric pollution. An AQF application has complex workflows and in order to produce timely ...
Yonghong Yan, Barbara M. Chapman
DEBS
2008
ACM
15 years 28 days ago
Availability models for underlay aware overlay networks
Availability of an overlay network is a necessary condition for event delivery in event based systems. The availability of the overlay links depends on the underlying physical net...
Madhu Kumar SD, Umesh Bellur