Sciweavers

1162 search results - page 142 / 233
» Specifying Reusable Components
Sort
View
ISW
1997
Springer
15 years 2 months ago
A Framework for the Management of Information Security
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
Jussipekka Leiwo, Yuliang Zheng
IWFM
1998
113views Formal Methods» more  IWFM 1998»
14 years 11 months ago
A Use Case Interpretation of B AMN
In this paper we suggest methods to aid the development of specifications using the B method. We propose an objectoriented approach to specification, developing the structure thro...
Richard Shore
COLING
1990
14 years 11 months ago
Unbounded Dependency: Tying strings to rings
: This paper outlines a framework for connectionist representation based on the composition of connectionist states under vector space operators. The framework is used to specify a...
Jon M. Slack
CORR
2010
Springer
92views Education» more  CORR 2010»
14 years 10 months ago
Applying Constraint Solving to the Management of Distributed Applications
Abstract. We present our approach for deploying and managing distributed component-based applications. A Desired State Description (DSD), written in a high-level declarative langua...
Andrew McCarthy, Alan Dearle, Graham N. C. Kirby
ALIFE
2005
14 years 9 months ago
State Aggregation and Population Dynamics in Linear Systems
We consider complex systems that are composed of many interacting elements, evolving under some dynamics. We are interested in characterizing the ways in which these elements may b...
Jonathan E. Rowe, Michael D. Vose, Alden H. Wright