Sciweavers

5344 search results - page 271 / 1069
» Privacy-Preserving Set Operations
Sort
View
RTAS
1998
IEEE
15 years 8 months ago
Using Windows NT for Real-Time Applications: Experimental Observations and Recommendations
Windows NT was not designed as a real-time operating system, but market forces and the acceptance of NT in industrial applications have generated a need for achieving real-time fu...
Krithi Ramamritham, Chia Shen, Oscar Gonzál...
DEXAW
1997
IEEE
99views Database» more  DEXAW 1997»
15 years 8 months ago
A Framework for Dynamic Changes in Workflow Management Systems
Current workflow management systems (WFMSs) are only applicable in a reliable and secure manner, if the business process (BP) to be supported is wellstructured. As ad hoc deviatio...
Manfred Reichert, Peter Dadam
CONCUR
1997
Springer
15 years 8 months ago
Probabilistic Concurrent Constraint Programming
Abstract. We extend cc to allow the specification of a discrete probability distribution for random variables. We demonstrate the expressiveness of pcc by synthesizing combinators...
Vineet Gupta, Radha Jagadeesan, Vijay A. Saraswat
TACAS
1997
Springer
146views Algorithms» more  TACAS 1997»
15 years 8 months ago
Compositional State Space Generation from Lotos Programs
This paper describes a compositional approach to generate the labeled transition system representing the behavior of a Lotos program by repeatedly alternating composition and reduc...
Jean-Pierre Krimm, Laurent Mounier
RTA
1993
Springer
15 years 8 months ago
Bi-rewriting, a Term Rewriting Technique for Monotonic Order Relations
We propose an extension of rewriting techniques to derive inclusion relations a ⊆ b between terms built from monotonic operators. Instead of using only a rewriting relation ⊆ ...
Jordi Levy, Jaume Agustí-Cullell