Sciweavers

3771 search results - page 366 / 755
» Subobject Transformation Systems
Sort
View
ECMDAFA
2008
Springer
97views Hardware» more  ECMDAFA 2008»
15 years 6 months ago
Model-Driven Security in Practice: An Industrial Experience
Abstract. In this paper we report on our experience on using the socalled model-driven security approach in an MDA industrial project. In model-driven security, "designers spe...
Manuel Clavel, Viviane da Silva, Christiano Braga,...
WSC
2004
15 years 6 months ago
Automated Database and Schema-Based Data Interchange for Modeling and Simulation
Creating a simulation of a large enterprise system by manually coding all the details into a simulator tool is not just time consuming, but yields a system that is difficult to ma...
Gregory A. Harrison, David S. Maynard, Eytan Polla...
NAACL
2003
15 years 6 months ago
A Generative Probabilistic OCR Model for NLP Applications
In this paper, we introduce a generative probabilistic optical character recognition (OCR) model that describes an end-to-end process in the noisy channel framework, progressing f...
Okan Kolak, William J. Byrne, Philip Resnik
OPODIS
1997
15 years 6 months ago
Solving Consensus in a Byzantine Environment Using an Unreliable Fault Detector
Unreliable fault detectors can be used to solve the consensus problem in asynchronous distributed systems that are subject to crash faults. We extend this result to asynchronous d...
Kim Potter Kihlstrom, Louise E. Moser, P. M. Melli...
IANDC
2008
131views more  IANDC 2008»
15 years 4 months ago
Termination of just/fair computations in term rewriting
The main goal of this paper is to apply rewriting termination technology --enjoying a quite mature set of termination results and tools-- to the problem of proving automatically t...
Salvador Lucas, José Meseguer