Sciweavers

529 search results - page 6 / 106
» Laws of Pattern Composition
Sort
View
QSIC
2007
IEEE
14 years 3 months ago
Model Checking Security Pattern Compositions
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
Jing Dong, Tu Peng, Yajing Zhao
EAAI
2008
136views more  EAAI 2008»
13 years 8 months ago
Adaptive fuzzy control of a non-linear servo-drive: Theory and experimental results
Adaptive fuzzy control has been an active research area over the last decade and several stable adaptive fuzzy controllers have been proposed in the literature. Such controllers a...
Domenico Bellomo, David Naso, Robert Babuska
KDD
2005
ACM
140views Data Mining» more  KDD 2005»
14 years 9 months ago
Graphs over time: densification laws, shrinking diameters and possible explanations
How do real graphs evolve over time? What are "normal" growth patterns in social, technological, and information networks? Many studies have discovered patterns in stati...
Jure Leskovec, Jon M. Kleinberg, Christos Faloutso...
ENTCS
2010
130views more  ENTCS 2010»
13 years 6 months ago
Structural Operational Semantics and Modal Logic, Revisited
A previously introduced combination of the bialgebraic approach to structural operational semantics with aic modal logic is re-examined and improved in some aspects. Firstly, a mo...
Bartek Klin
BIRTHDAY
2004
Springer
14 years 2 months ago
Composing Hidden Information Modules over Inclusive Institutions
: This paper studies the composition of modules that can hide information, over a very general class of logical systems called inclusive institutions. Two semantics are given for c...
Joseph A. Goguen, Grigore Rosu