Sciweavers

3555 search results - page 596 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ICLP
2005
Springer
15 years 7 months ago
Polynomial Interpretations as a Basis for Termination Analysis of Logic Programs
Our goal is to study the feasibility of porting termination analysis techniques developed for one programming paradigm to another paradigm. In this paper, we show how to adapt ter...
Manh Thang Nguyen, Danny De Schreye
APSEC
2003
IEEE
15 years 6 months ago
JINI/J2EE Bridge for Large-scale IP Phone Services
Current IP phone architectures which bring phone services to a distributed open environment are eraltively static and do not scale well. An IP phone environment should be more dyn...
Jia Yu, Jan Newmarch, Michael Geisler
FM
2001
Springer
130views Formal Methods» more  FM 2001»
15 years 6 months ago
Towards a Topos Theoretic Foundation for the Irish School of Constructive Mathematics
The Irish School of Constructive Mathematics (M♣ c ), which extends the VDM, exploits an algebraic notation based upon monoids and their morphisms for the purposes of abstract mo...
Mícheál Mac an Airchinnigh
AVI
2008
15 years 3 months ago
Shadow tracking on multi-touch tables
Multi-touch interfaces have been a focus of research in recent years, resulting in development of various innovative UI concepts. Support for existing WIMP interfaces, however, sh...
Florian Echtler, Manuel Huber, Gudrun Klinker
IMSA
2001
143views Multimedia» more  IMSA 2001»
15 years 2 months ago
A Collaborative Electronic Laboratory Notebook
We have developed a secure, collaborative, web-based electronic notebook (EN) designed to provide researchers and students with a means to record and share their primary research ...
James D. Myers, Elena S. Mendoza, B. Hoopes