Sciweavers

2004 search results - page 378 / 401
» Interaction nets: programming language design and implementa...
Sort
View
ICSE
2010
IEEE-ACM
15 years 5 months ago
Requirements reflection: requirements as runtime entities
Computational reflection is a well-established technique that gives a program the ability to dynamically observe and possibly modify its behaviour. To date, however, reflection is...
Nelly Bencomo, Jon Whittle, Peter Sawyer, Anthony ...
ASWEC
2010
IEEE
15 years 3 months ago
Non-Monotonic Model Completion in Web Application Engineering
—Formal models are often used to verify systems and prove their correctness, and ensure that transformed models remain consistent to the original system. However, formal techniqu...
Jevon M. Wright, Jens Dietrich
PUC
2007
113views more  PUC 2007»
15 years 2 months ago
Yesterday's tomorrows: notes on ubiquitous computing's dominant vision
Ubiquitous computing is unusual amongst technological research arenas. Most areas of computer science research, such as programming language implementation, distributed operating s...
Genevieve Bell, Paul Dourish
116
Voted
SEMWEB
2010
Springer
15 years 1 months ago
Experience of Using OWL Ontologies for Automated Inference of Routine Pre-operative Screening Tests
We describe our experience of designing and implementing a knowledge-based pre-operative assessment decision support system. We developed the system using semantic web technology, ...
Matt-Mouley Bouamrane, Alan L. Rector, Martin Hurr...
135
Voted
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
15 years 10 months ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...