Sciweavers

813 search results - page 89 / 163
» Pipeline-centric provenance model
Sort
View
BIRTHDAY
2009
Springer
14 years 1 months ago
Modular Verification of Strongly Invasive Aspects
An extended specification for aspects, and a new verification method based on model checking are used to establish the correctness of strongly-invasive aspects, independently of a...
Emilia Katz, Shmuel Katz
ASM
2008
ASM
13 years 11 months ago
Using EventB to Create a Virtual Machine Instruction Set Architecture
A Virtual Machine (VM) is a program running on a conventional microprocessor that emulates the binary instruction set, registers, and memory space of an idealized computing machine...
Stephen Wright
SIROCCO
2007
13 years 10 months ago
Labeling Schemes with Queries
Recently, quite a few papers studied methods for representing network properties by assigning informative labels to the vertices of a network. Consulting the labels given to any t...
Amos Korman, Shay Kutten
ECIS
2003
13 years 10 months ago
The value of cooperative planning in supply chains. A simulative approach
In this paper we examine, how the benefits of Supply Chain Management, as announced by the literature and widely accepted, can simulatively be proven. We first present selected re...
Luis Martín Díaz, Peter Buxmann
MASCOTS
2001
13 years 10 months ago
BRITE: An Approach to Universal Topology Generation
Effective engineering of the Internet is predicated upon a detailed understanding of issues such as the large-scale structure of its underlying physical topology, the manner in wh...
Alberto Medina, Anukool Lakhina, Ibrahim Matta, Jo...