Sciweavers

1156 search results - page 90 / 232
» Compositional Methods for Information-Hiding
Sort
View
EUSFLAT
2003
119views Fuzzy Logic» more  EUSFLAT 2003»
13 years 10 months ago
Comparison of two approaches to approximated reasoning
A comparison is made of two approaches to approximate reasoning: Mamdani's interpolation method and the implication method. Both approaches are variants of Zadeh's compo...
Pim van den Broek
KESAMSTA
2011
Springer
12 years 12 months ago
Extending the JADE Agent Behaviour Model with JBehaviourTrees Framework
Creating modular behaviours in JADE using a traditional method such as the FSM (Finite State Machine) can be a difficult task to achieve. The first issue with FSMs is that they do...
Iva Bojic, Tomislav Lipic, Mario Kusek, Gordan Jez...
ECOOP
2011
Springer
12 years 8 months ago
Verifying Multi-object Invariants with Relationships
Relationships capture the interplay between classes in object-oriented programs, and various extensions of object-oriented programming languages allow the programmer to explicitly ...
Stephanie Balzer, Thomas R. Gross
ESOP
2009
Springer
14 years 3 months ago
Deny-Guarantee Reasoning
Abstract. Rely-guarantee is a well-established approach to reasoning about concurrent programs that use parallel composition. However, parallel composition is not how concurrency i...
Mike Dodds, Xinyu Feng, Matthew J. Parkinson, Vikt...
ASWEC
2007
IEEE
14 years 3 months ago
Dynamic Protocol Aggregation and Adaptation for Service-Oriented Computing
Service Oriented Computing (SOC) is a paradigm for building new software applications from existing loosely-coupled services. During service composition, services available to pla...
Linh Duy Pham, Alan W. Colman, Jean-Guy Schneider