Sciweavers

1156 search results - page 8 / 232
» Compositional Methods for Information-Hiding
Sort
View
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
14 years 2 months ago
Service Composition in Public Networks: Results from a Quasi-Experiment
New systems can be created by assembling a set of elementary services provided by various stakeholders in a service composition. Service composition is not a trivial endeavor and ...
Ralph Feenstra, Marijn Janssen
SIAMCO
2008
73views more  SIAMCO 2008»
13 years 7 months ago
A Post-Treatment of the Homogenization Method for Shape Optimization
We propose an alternative to the classical post-treatment of the homogenization method for shape optimization. Rather than penalize the material density once the optimal composite ...
O. Pantz, K. Trabelsi
CSSE
2008
IEEE
14 years 1 months ago
Web Services Composition Method Based on OWL
—At present, Web services are created and updated on the fly. It has already beyond the human ability to analysis them and generate the composition plan manually. It is a problem...
Jike Ge, Yuhui Qiu, Shiqun Yin
CONCUR
2001
Springer
14 years 53 min ago
Compositional Methods for Probabilistic Systems
Abstract. We present a compositional trace-based model for probabilistic systems. The behavior of a system with probabilistic choice is a stochasticprocess, namely, a probability d...
Luca de Alfaro, Thomas A. Henzinger, Ranjit Jhala
KBSE
2009
IEEE
14 years 2 months ago
Symbolic Deadlock Analysis in Concurrent Libraries and Their Clients
Methods in object-oriented concurrent libraries hide internal synchronization details. However, information hiding may result in clients causing thread safety violations by invoki...
Jyotirmoy V. Deshmukh, E. Allen Emerson, Sriram Sa...