Sciweavers

2864 search results - page 431 / 573
» Constraint Programming in OPL
Sort
View
ICTCS
2005
Springer
14 years 2 months ago
Checking Risky Events Is Enough for Local Policies
Abstract. An extension of the λ-calculus is proposed to study historybased access control. It allows for parametrized security policies with a possibly nested, local scope. To gov...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
SAT
2005
Springer
138views Hardware» more  SAT 2005»
14 years 2 months ago
On Applying Cutting Planes in DLL-Based Algorithms for Pseudo-Boolean Optimization
The utilization of cutting planes is a key technique in Integer Linear Programming (ILP). However, cutting planes have seldom been applied in Pseudo-Boolean Optimization (PBO) algo...
Vasco M. Manquinho, João P. Marques Silva
SOFSEM
2005
Springer
14 years 2 months ago
Tier Aspect Model Based on Updatable Views
The tier aspect model addresses Aspect Oriented Programming (AOP) in the context of database applications. It is a new technique of separation of concerns through tiers implemented...
Radoslaw Adamus, Kazimierz Subieta
FAABS
2004
Springer
14 years 2 months ago
Towards Timed Automata and Multi-agent Systems
Abstract. The design of reactive systems must comply with logical correctness (the system does what it is supposed to do) and timeliness (the system has to satisfy a set of tempora...
Guillaume Hutzler, Hanna Klaudel, D. Yue Wang
ICWE
2004
Springer
14 years 2 months ago
Towards Reconciling Quality and Agility in Web Application Development
Delivering high quality web applications complying with severe project delivery time constraints is still an elusive goal for a software process. In many software projects, develop...
Américo Sampaio, Alexandre Vasconcelos, Ped...