Sciweavers

1743 search results - page 225 / 349
» Language resources for Hebrew
Sort
View
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
15 years 10 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
ICMB
2005
IEEE
118views Business» more  ICMB 2005»
15 years 10 months ago
A Context-Sensitive Service Discovery Protocol for Mobile Computing Environments
Service discovery is important in mobile and pervasive computing environments, where the set of resources available to an entity changes dynamically over time. This paper describe...
Ricky Robinson, Jadwiga Indulska
AADEBUG
2005
Springer
15 years 9 months ago
Lightweight bug localization with AMPLE
AMPLE locates likely failure-causing classes by comparing method call sequences of passing and failing runs. A difference in method call sequences, such as multiple deallocation ...
Valentin Dallmeier, Christian Lindig, Andreas Zell...
CP
2005
Springer
15 years 9 months ago
Dimensioning an Inbound Call Center Using Constraint Programming
One of the critical problems in the call center industries is the staffing problem since they must face variable demands and because staff costs represent a major part of the cost...
Cyril Canon, Jean-Charles Billaut, Jean-Louis Bouq...
CSL
2005
Springer
15 years 9 months ago
Distributed Control Flow with Classical Modal Logic
In previous work we presented a foundational calculus for spatially distributed computing based on intuitionistic modal logic. With the modalities P and Q we were able to capture t...
Tom Murphy VII, Karl Crary, Robert Harper