Sciweavers

2043 search results - page 359 / 409
» Reasoning About Security Models
Sort
View
SEKE
2005
Springer
14 years 3 months ago
Institution Morphisms for Relating OWL and Z
Checking for properties of Web ontologies is important for the development of reliable Semantic Web systems. Software specification and verification tools can be used to complem...
Dorel Lucanu, Yuan-Fang Li, Jin Song Dong
WDAG
2004
Springer
88views Algorithms» more  WDAG 2004»
14 years 3 months ago
Nonblocking Concurrent Data Structures with Condition Synchronization
We apply the classic theory of linearizability to operations that must wait for some other thread to establish a precondition. We model such an operation as a request and a follow-...
William N. Scherer III, Michael L. Scott
ICTAI
2003
IEEE
14 years 3 months ago
An Intelligent Early Warning System for Software Quality Improvement and Project Management
One of the main reasons behind unfruitful software development projects is that it is often too late to correct the problems by the time they are detected. It clearly indicates th...
Xiaoqing Frank Liu, Gautam Kane, Monu Bambroo
INFOCOM
2003
IEEE
14 years 3 months ago
On-line Tuning of Prices for Network Services
— Recent investigations into the pricing of multiclass loss networks have shown that static prices are optimal in the asymptotic regime of many small sources. These results sugge...
Enrique Campos-Náñez, Stephen D. Pat...
AUSAI
2003
Springer
14 years 3 months ago
Multimedia Analysis and Synthesis
We describe novel approaches to multimedia analysis and synthesis problems. We first present the experiential sampling technique which has the ability to focus on the analysis task...
Mohan S. Kankanhalli