Sciweavers

1757 search results - page 178 / 352
» Integrating and Extending JCSP
Sort
View
I3E
2001
196views Business» more  I3E 2001»
15 years 6 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel
IVEVA
2004
15 years 6 months ago
Using Hardware-based Voice Recognition to Interact with a Virtual Environment
This paper presents ongoing research on human-computer interaction in virtual environments using voice recognition systems. The paper starts describing voice recognition technologi...
Miguel A. Garcia-Ruiz, Cesar R. Bustos-Mendoza
152
Voted
ECIS
2003
15 years 6 months ago
An agent-based framework for materialized view maintenance in collaborative electronic commerce environments
For extended enterprises, value-chain integration means that enterprise business systems can no longer be confined to internal processes, applications, and data repositories. What...
Aristides Triantafillakis, Panagiotis Kanellis, Dr...
134
Voted
ECIS
2003
15 years 6 months ago
Towards an interdisciplinary theory of networks
Research problems in ICT networks often comprise coordination problems of information infrastructures and require state-of-the-art methods of coping with complex system dynamics. ...
Tim Weitzel, Oliver Wendt, Wolfgang König
FMOODS
2003
15 years 6 months ago
Inductive Proof Outlines for Monitors in Java
The research concerning Java’s semantics and proof theory has mainly focussed on various aspects of sequential sub-languages. Java, however, integrates features of a class-based ...
Erika Ábrahám, Frank S. de Boer, Wil...