Sciweavers

493 search results - page 54 / 99
» Strategies and simulations in a semantic framework
Sort
View
LISP
2006
105views more  LISP 2006»
14 years 11 months ago
Call-by-push-value: Decomposing call-by-value and call-by-name
We present the call-by-push-value (CBPV) calculus, which decomposes the typed call-by-value (CBV) and typed call-by-name (CBN) paradigms into fine-grain primitives. On the operatio...
Paul Blain Levy
FUIN
2008
88views more  FUIN 2008»
14 years 12 months ago
Validating Behavioral Component Interfaces in Rewriting Logic
Many distributed applications can be understood in terms of components interacting in an open environment such as the Internet. Open environments are subject to change in unpredic...
Einar Broch Johnsen, Olaf Owe, Arild B. Torjusen
COMPLEX
2009
Springer
15 years 6 months ago
Designing Capital-Intensive Systems with Architectural and Operational Flexibility Using a Screening Model
: Development of capital intensive systems, such as offshore oil platforms or other industrial infrastructure, generally requires a significant amount of capital investment under v...
Jijun Lin, Olivier de Weck, Richard de Neufville, ...
CCGRID
2007
IEEE
15 years 3 months ago
Mobility-Aware Efficient Job Scheduling in Mobile Grids
In this paper, we present a node mobility prediction framework based on a generic mobile grid architecture. We show how this framework can be used to formulate a cost effective job...
Preetam Ghosh, Nirmalya Roy, Sajal K. Das
AMC
2005
143views more  AMC 2005»
14 years 11 months ago
Investment with restricted stock and the value of information
In most public companies in China, there are two thirds of shares that cannot be traded freely in the secondary market. These illiquid shares, however, may be allowed to circulate...
Weixing Wu, Yongxiang Wang