Sciweavers

271 search results - page 40 / 55
» From Trust to Dependability through Risk Analysis
Sort
View
SOCA
2008
IEEE
13 years 7 months ago
Log-based mining techniques applied to Web service composition reengineering
There is no doubt that SOA and BPM will continue to evolve dependently for the next ten years. Preparing common research infrastructures will require most important efforts of web ...
Walid Gaaloul, Karim Baïna, Claude Godart
ICST
2009
IEEE
13 years 5 months ago
Putting Formal Specifications under the Magnifying Glass: Model-based Testing for Validation
A software development process is conceptually an abstract form of model transformation, starting from an enduser model of requirements, through to a system model for which code c...
Emine G. Aydal, Richard F. Paige, Mark Utting, Jim...
CCS
2009
ACM
14 years 2 months ago
NISAN: network information service for anonymization networks
Network information distribution is a fundamental service for any anonymization network. Even though anonymization and information distribution about the network are two orthogona...
Andriy Panchenko, Stefan Richter, Arne Rache
SASO
2008
IEEE
14 years 2 months ago
How to Control Emergence of Behaviours in a
—An open issue in self-organisation is how to control the emergence of behaviour. This issue is also of interest for engineering holonic multi-agent systems as any level of a hol...
Massimo Cossentino, Stéphane Galland, Nicol...
DMCS
2003
13 years 9 months ago
A symbolic projection of Langton's Ant
d Abstract) Anah´ı Gajardo† GI2MA, Departamento de Ingenier´ıa Matem´atica, Universidad de Concepci´on, Casilla 160-C, correo 3, Concepci´on, Chile The Langton’s ant is ...
Anahí Gajardo