Sciweavers

248 search results - page 35 / 50
» Checking e-service consistency using Description Logics
Sort
View
RTA
1995
Springer
14 years 4 days ago
Prototyping Completion with Constraints Using Computational Systems
We use computational systems to express a completion with constraints procedure that gives priority to simplifications. Computational systems are rewrite theories enriched by stra...
Hélène Kirchner, Pierre-Etienne More...
WSC
1998
13 years 10 months ago
Emulation of a Material Delivery System
Emulation is the process of exactly imitating a real system. Recent advances in simulation technology make it possible to emulate real world control systems by using a system'...
Todd LeBaron, Kelly Thompson
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
14 years 2 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
AI
2010
Springer
13 years 8 months ago
Logic-based ontology comparison and module extraction, with an application to DL-Lite
We develop a formal framework for comparing different versions of ontologies, and apply it to ontologies formulated in terms of DL-Lite, a family of `lightweight' description...
Roman Kontchakov, Frank Wolter, Michael Zakharyasc...
JOT
2010
144views more  JOT 2010»
13 years 7 months ago
A Tool for Specifying and Validating Agents' Interaction Protocols: From Agent UML to Maude
To achieve the multi-agent systems’ goals, agents interact to exchange information, to cooperate and to coordinate their tasks. Interaction is generally recognized as an importa...
Farid Mokhati, Brahim Sahraoui, Soufiane Bouzaher,...