Sciweavers

2123 search results - page 133 / 425
» Composition of Cyber-Physical Systems
Sort
View
170
Voted
ISI
2004
Springer
15 years 10 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
147
Voted
COOPIS
2003
IEEE
15 years 10 months ago
The Semantics of the Compound Term Composition Algebra
Abstract. In [11], we proposed an algebra with four algebraic operators, whose composition can be used to generate valid compound terms in a given faceted taxonomy in an efficient ...
Yannis Tzitzikas, Anastasia Analyti, Nicolas Spyra...
ICSE
2009
IEEE-ACM
15 years 9 months ago
A compositional approach to bidirectional model transformation
Bidirectional model transformation plays an important role in maintaining consistency between two models, and has many potential applications in software development, including mo...
Soichiro Hidaka, Zhenjiang Hu, Hiroyuki Kato, Keis...
121
Voted
CHARME
2003
Springer
120views Hardware» more  CHARME 2003»
15 years 8 months ago
A Compositional Theory of Refinement for Branching Time
Abstract. I develop a compositional theory of refinement for the branching time framework based on stuttering simulation and prove that if one system refines another, then a refine...
Panagiotis Manolios
FASE
2010
Springer
15 years 8 months ago
Incremental Service Composition Based on Partial Matching of Visual Contracts
Services provide access to software components that can be discovered dynamically via the Internet. The increasing number of services a requesters may be able to use demand support...
Muhammad Naeem, Reiko Heckel, Fernando Orejas, Fra...