Sciweavers

2517 search results - page 14 / 504
» Specifying Weak Sets
Sort
View
ESAW
2008
Springer
13 years 9 months ago
Specifying Open Agent Systems: A Survey
Abstract. Electronic markets, dispute resolution and negotiation protocols are three types of application domain that can be viewed as open agent systems. Members of such systems a...
Alexander Artikis, Jeremy V. Pitt
BIRTHDAY
2010
Springer
13 years 6 months ago
Specifying and Verifying Organizational Security Properties in First-Order Logic
In certain critical cases the data flow between business departments in banking organizations has to respect security policies known as Chinese Wall or Bell–La Padula. We show t...
Christoph Brandt, Jens Otten, Christoph Kreitz, Wo...
MLQ
1998
103views more  MLQ 1998»
13 years 7 months ago
Versions of Normality and Some Weak Forms of the Axiom of Choice
Abstract. We investigate the set theoretical strength of some properties of normality, including Urysohn’s Lemma, Tietze-Urysohn Extension Theorem, normality of disjoint unions o...
Paul E. Howard, Kyriakos Keremedis, Herman Rubin, ...
UML
2005
Springer
14 years 27 days ago
Specifying Precise Use Cases with Use Case Charts
Use cases are a popular method for capturing and structuring software requirements. The informality of use cases is both a blessing and a curse. It enables easy application and lea...
Jon Whittle
DAIS
1997
13 years 8 months ago
A System for Specifying and Coordinating the Execution of Reliable Distributed Applications
An increasing number of distributed applications are being constructed by composing them out of existing applications. The resulting applications can be very complex in structure,...
Frédéric Ranno, Santosh K. Shrivasta...