Sciweavers

1588 search results - page 314 / 318
» On the Logic of Constitutive Rules
Sort
View
KESAMSTA
2009
Springer
13 years 12 months ago
Structural Changes in an Email-Based Social Network
ent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory Chung-Ming Ou, C.R. Ou Ants-like Agents: a Model and Analysis Based on Natural Ants Be...
Krzysztof Juszczyszyn, Katarzyna Musial
CONTEXT
2001
Springer
13 years 12 months ago
Local Holism
Abstract. This paper is devoted to discuss a general tendency in contextualism which is known as "radical contextualism". In the first part I state the well known paradox...
Carlo Penco
ECOOPW
1998
Springer
13 years 11 months ago
Mapping Business Processes to Software Design Artifacts
This paper explains the structure of a project repository, which enables you to trace business processes and business rules to the architecture and design of the software system. T...
Pavel Hruby
CAV
2004
Springer
151views Hardware» more  CAV 2004»
13 years 11 months ago
QB or Not QB: An Efficient Execution Verification Tool for Memory Orderings
We study the problem of formally verifying shared memory multiprocessor executions against memory consistency models--an important step during post-silicon verification of multipro...
Ganesh Gopalakrishnan, Yue Yang, Hemanthkumar Siva...
CCS
2001
ACM
13 years 11 months ago
Efficient State Updates for Key Management
Encryption is widely used to enforce usage rules for digital content. In many scenarios content is encrypted using a group key which is known to a group of users that are allowed ...
Benny Pinkas