Sciweavers

1661 search results - page 64 / 333
» Real-time specification patterns
Sort
View
EUROPLOP
2006
14 years 11 months ago
Securing the Broker Pattern
We consider how to add security to the Broker distribution pattern. We do so by examining how systems using Broker are secured in practice, and by then revising the pattern to ref...
Patrick Morrison, Eduardo B. Fernandez
FCT
1997
Springer
15 years 2 months ago
Trade-Off Results for Connection Management
A connection management protocol establishes a connection between two hosts across a wide-area network to allow reliable message delivery. Following previous work of Kleinberg et a...
Marios Mavronicolas, Nikos Papadakis
ENTCS
2008
100views more  ENTCS 2008»
14 years 10 months ago
Implementing an EJB3-Specific Graph Transformation Plugin by Using Database Independent Queries
The current paper presents a novel approach to implement a graph transformation engine as an EJB3-specific plugin by using EJB QL queries for pattern matching. The essence of the ...
Gergely Varró
VMCAI
2010
Springer
15 years 7 months ago
Considerate Reasoning and the Composite Design Pattern
We propose Considerate Reasoning, a novel specification and verification technique based on object invariants. This technique supports succinct specifications of implementations wh...
Alexander J. Summers, Sophia Drossopoulou
ICMCS
2008
IEEE
145views Multimedia» more  ICMCS 2008»
15 years 4 months ago
Video search reranking via online ordinal reranking
To exploit co-occurrence patterns among features and target semantics while keeping the simplicity of the keywordbased visual search, a novel reranking methods is proposed. The ap...
Yi-Hsuan Yang, Winston H. Hsu