Sciweavers

241 search results - page 12 / 49
» Design by Contract Using Meta-Assertions
Sort
View
ICFEM
2010
Springer
13 years 5 months ago
Reasoning about Safety and Progress Using Contracts
Designing concurrent or distributed systems with complex architectures while preserving a set of high-level requirements through all design steps is not a trivial task. Building up...
Imene Ben Hafaiedh, Susanne Graf, Sophie Quinton
SIGECOM
2005
ACM
98views ECommerce» more  SIGECOM 2005»
14 years 1 months ago
Hidden-action in multi-hop routing
In multi-hop networks, the actions taken by individual intermediate nodes are typically hidden from the communicating endpoints; all the endpoints can observe is whether or not th...
Michal Feldman, John Chuang, Ion Stoica, Scott She...
JSAC
2007
87views more  JSAC 2007»
13 years 7 months ago
Hidden-Action in Network Routing
— In communication networks, such as the Internet or mobile ad-hoc networks, the actions taken by intermediate nodes or links are typically hidden from the communicating endpoint...
Michal Feldman, John Chuang, Ion Stoica, Scott She...
IOR
2010
169views more  IOR 2010»
13 years 6 months ago
Dynamic Supplier Contracts Under Asymmetric Inventory Information
In this paper, we examine a supply chain in which a single supplier sells to a downstream retailer. We consider a multi-period model, with the following sequence of events. In per...
Hao Zhang, Mahesh Nagarajan, Greys Sosic
ACSW
2004
13 years 9 months ago
Defining Security Services for Electronic Tendering
A major step is required to integrate critical legal requirements into e-tendering system design. The current systems using ad-hoc security mechanisms do not meet the legal requir...
Rong Du, Ernest Foo, Colin Boyd, Brian Fitzgerald