Sciweavers

977 search results - page 160 / 196
» Soft Constraints for Security
Sort
View
GECON
2007
Springer
124views Business» more  GECON 2007»
15 years 4 months ago
On Business Grid Demands and Approaches
This paper addresses necessary modification and extensions of existing Grid Computing approaches in order to meet nowadays business demand. So far, Grid Computing has been used to...
Carsten Franke, Adolf Hohl, Philip Robinson, Bernd...
PPDP
2005
Springer
15 years 3 months ago
Trace effects and object orientation
fects are statically generated program abstractions, that can be model checked for verification of assertions in a temporal program logic. In this paper we develop a type and eff...
Christian Skalka
OOPSLA
2004
Springer
15 years 3 months ago
Modular generics
This paper presents the design of G, a new language specifically created for generic programming. We review and identify important language features of C++ and Haskell in light o...
Jeremy G. Siek
HICSS
2003
IEEE
130views Biometrics» more  HICSS 2003»
15 years 3 months ago
Estimating the Actual Cost of Transmission System Congestion
This paper describes a methodology that could be used by a utility to estimate the actual cost of congestion on its transmission system using limited, non-state estimator data. Th...
Thomas J. Overbye
ER
2009
Springer
316views Database» more  ER 2009»
15 years 1 months ago
XMI2USE: A Tool for Transforming XMI to USE Specifications
Abstract. The UML-based Specification Environment (USE) tool supports the syntactic analysis, type checking, consistency checking, and dynamic validation of invariants and pre-/pos...
Wuliang Sun, Eunjee Song, Paul C. Grabow, Devon M....