Sciweavers

107 search results - page 17 / 22
» Independence from obfuscation: A semantic framework for dive...
Sort
View
QSIC
2005
IEEE
14 years 8 days ago
Runtime Validation of Behavioural Contracts for Component Software
In component software, the independence of components is achieved by separating their interfaces from implementations. The interface definition of a component serves as the contr...
Yan Jin, Jun Han
IPPS
2003
IEEE
13 years 12 months ago
Constrained Component Deployment in Wide-Area Networks Using AI Planning Techniques
Component-based models represent a dominant trend in the construction of wide-area network applications, making possible the integration of diverse functionality contained in modu...
Tatiana Kichkaylo, Anca-Andreea Ivan, Vijay Karamc...
AUSAI
1998
Springer
13 years 11 months ago
A Formal Embedding of AgentSpeak(L) in 3APL
Agent-based computing in Arti cial Intelligence has given rise to a number of diverse and competing proposals for agent programming languages. Agents, in the sense we are using it...
Koen V. Hindriks, Frank S. de Boer, Wiebe van der ...
SARA
2009
Springer
13 years 11 months ago
Rewriting Constraint Models with Metamodels
An important challenge in constraint programming is to rewrite constraint models into executable programs calculating the solutions. This phase of constraint processing may requir...
Raphaël Chenouard, Laurent Granvilliers, Rica...
SIGMOD
2002
ACM
134views Database» more  SIGMOD 2002»
14 years 6 months ago
Data Modelling versus Ontology Engineering
Ontologies in current computer science parlance are computer based resources that represent agreed domain semantics. Unlike data models, the fundamental asset of ontologies is the...
Peter Spyns, Robert Meersman, Mustafa Jarrar