Sciweavers

260 search results - page 29 / 52
» From Rules to Constraint Programs with the Rules2CP Modellin...
Sort
View
SIGSOFT
2007
ACM
14 years 9 months ago
Model checking service compositions under resource constraints
When enacting a web service orchestration defined using the Business Process Execution Language (BPEL) we observed various safety property violations. This surprised us considerab...
David S. Rosenblum, Howard Foster, Jeff Kramer, Je...
DSS
2006
140views more  DSS 2006»
13 years 8 months ago
Access control and audit model for the multidimensional modeling of data warehouses
Due to the sensitive data contained in Data Warehouses (DW), it is essential to specify security measures from the early stages of the DW design and enforce them. Traditional acce...
Eduardo Fernández-Medina, Juan Trujillo, Ro...
ECOOP
1998
Springer
14 years 1 months ago
Orthogonal to the Java Imperative
Three nontrivial limitations of the existing JavaT M technology are considered from the viewpoint of object-oriented database technology. The limitations are: lack of support for o...
Suad Alagic, Jose Solorzano, David Gitchell
TOOLS
1999
IEEE
14 years 1 months ago
Analysis by Contract or UML with Attitude
This paper summarises a tutorial entitled Analysis by Contract. Using fragments from a simple case study concerning a video store, the paper shows how a type model can provide the...
Richard Mitchell
COLT
1994
Springer
14 years 26 days ago
Bayesian Inductive Logic Programming
Inductive Logic Programming (ILP) involves the construction of first-order definite clause theories from examples and background knowledge. Unlike both traditional Machine Learnin...
Stephen Muggleton