Sciweavers

2905 search results - page 187 / 581
» Formal Memetic Algorithms
Sort
View
JCS
2007
103views more  JCS 2007»
13 years 10 months ago
Risk management for distributed authorization
Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all asse...
Christian Skalka, Xiaoyang Sean Wang, Peter C. Cha...
COMCOM
1998
117views more  COMCOM 1998»
13 years 10 months ago
Specification, validation, and verification of time-critical systems
In this paper, we propose a new formalism, named the Timed Communicating Finite State Machine (Timed CFSM), for specifying and verifying time-critical systems. Timed CFSM preserve...
Shiuh-Pyng Shieh, Jun-Nan Chen
FOIKS
2010
Springer
13 years 8 months ago
Two Complementary Classification Methods for Designing a Concept Lattice from Interval Data
This paper holds on the application of two classification methods based on formal concept analysis (FCA) to interval data. The first method uses a similarity between objects while ...
Mehdi Kaytoue-Uberall, Zainab Assaghir, Nizar Mess...
FORTE
2009
13 years 8 months ago
Typing Component-Based Communication Systems
Abstract. Building complex component-based software systems, for instance communication systems based on the Click, Coyote, Appia, or Dream frameworks, can lead to subtle assemblag...
Michael Lienhardt, Claudio Antares Mezzina, Alan S...
DOCENG
2010
ACM
13 years 7 months ago
Diffing, patching and merging XML documents: toward a generic calculus of editing deltas
This work addresses what we believe to be a central issue in the field of XML diff and merge computation: the mathematical modeling o-called editing deltas and the study of their ...
Jean-Yves Vion-Dury