Sciweavers

504 search results - page 72 / 101
» Definitional Reflection and the Completion
Sort
View
CASDMKM
2004
Springer
144views Data Mining» more  CASDMKM 2004»
14 years 29 days ago
Knowledge-Information Circulation Through the Enterprise: Forward to the Roots of Knowledge Management
The field of Knowledge Management (KM) has already completed its initiatory phase, characterized by operational confusion between knowledge and information, stemming from the tenuo...
Milan Zeleny
LICS
1999
IEEE
13 years 12 months ago
Proof Techniques for Cryptographic Processes
Contextual equivalences for cryptographic process calculi, like the spi-calculus, can be used to reason about correctness of protocols, but their definition suffers from quantific...
Michele Boreale, Rocco De Nicola, Rosario Pugliese
ICSE
1999
IEEE-ACM
13 years 12 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith
ER
1998
Springer
115views Database» more  ER 1998»
13 years 11 months ago
Temporal Objects for Spatio-Temporal Data Models and a Comparison of Their Representations
Abstract: Currently, there are strong efforts to integrate spatial and temporal database technology into spatio-temporal database systems. This paper views the topic from a rather ...
Martin Erwig, Markus Schneider, Ralf Hartmut G&uum...
IFIP
1989
Springer
13 years 11 months ago
Software Fault Tolerance
The designation “fault tolerant software” has been used for techniques ranging from roll-back and retry to N-version programming, from data mirroring to functional redundancy....
Algirdas Avizienis