Sciweavers

956 search results - page 14 / 192
» Slicing Objects Using System Dependence Graphs
Sort
View
RANDOM
1998
Springer
14 years 2 months ago
Using Approximation Hardness to Achieve Dependable Computation
Abstract. Redundancy has been utilized to achieve fault tolerant computation and to achieve reliable communication in networks of processors. These techniques can only be extended ...
Mike Burmester, Yvo Desmedt, Yongge Wang
SRDS
1998
IEEE
14 years 2 months ago
AQuA: An Adaptive Architecture that Provides Dependable Distributed Objects
Dependable distributed systems are difficult to build. This is particularly true if they have dependability requirements that change during the execution of an application, and are...
Michel Cukier, Jennifer Ren, Chetan Sabnis, David ...
FASE
2009
Springer
14 years 1 months ago
Object Flow Definition for Refined Activity Diagrams
Activity diagrams are a well-known means to model the control flow of system behavior. Their expressiveness can be enhanced by using their object flow notation. In addition, we ref...
Stefan Jurack, Leen Lambers, Katharina Mehner, Gab...
ATAL
2004
Springer
14 years 1 months ago
State-Space Reduction Techniques in Agent Verification
We have developed a set of tools to allow the use of model-checking techniques for the verification of systems directly implemented in an agent-oriented programming language. The ...
Rafael H. Bordini, Michael Fisher, Willem Visser, ...
PG
2000
IEEE
14 years 2 months ago
Morphing Using Curves and Shape Interpolation Techniques
This paper presents solutions to the feature correspondence and feature interpolation problems in image morphing. The user specifies the correspondence between the source and the...
Henry Johan, Yuichi Koiso, Tomoyuki Nishita