Sciweavers

2043 search results - page 372 / 409
» Reasoning About Security Models
Sort
View
ETS
2000
IEEE
182views Hardware» more  ETS 2000»
13 years 9 months ago
Conferencing in communities of learners: examples from social history and science communication
A commonly encountered view of computer conferencing focuses on peer interaction, student empowerment and a shift in both teacher and student roles. This paper argues that this vi...
Ann C. Jones, Eileen Scanlon, Canan Tosunoglu Blak...
JAISE
2010
163views Algorithms» more  JAISE 2010»
13 years 4 months ago
Affective negotiation support systems
Negotiation is a process in which two or more parties aim to reach a joint agreement. As such negotiation involves rational decision making about options and issues. However, negot...
Joost Broekens, Catholijn M. Jonker, John-Jules Ch...
SPAA
2009
ACM
14 years 7 months ago
At-most-once semantics in asynchronous shared memory
Abstract. At-most-once semantics is one of the standard models for object access in decentralized systems. Accessing an object, such as altering the state of the object by means of...
Sotiris Kentros, Aggelos Kiayias, Nicolas C. Nicol...
ZUM
1997
Springer
125views Formal Methods» more  ZUM 1997»
14 years 2 months ago
A Formal OO Method Inspired by Fusion and Object-Z
We present a new formal OO method, called FOX, which is a synergetic combination of the semi-formal Fusion method and the formal specification language Object-Z. To manage complex...
Klaus Achatz, Wolfram Schulte
ECSQARU
2007
Springer
14 years 1 months ago
Approaches to Constructing a Stratified Merged Knowledge Base
Many merging operators have been proposed to merge either flat or stratified knowledge bases. The result of merging by such an operator is a flat base (or a set of models of the me...
Anbu Yue, Weiru Liu, Anthony Hunter