Sciweavers

2624 search results - page 404 / 525
» The 2LIP model and its implementations
Sort
View
PERCOM
2003
ACM
14 years 9 months ago
Location-Detection Strategies in Pervasive Computing Environments
Pervasive computing environments accommodate interconnected and communicating mobile devices. Mobility is a vital aspect of everyday life and technology must offer support for mov...
Sebastian Fischmeister, Guido Menkhaus, Alexander ...
ATAL
2009
Springer
14 years 4 months ago
Like an intuitive and courteous butler: a proactive personal agent for task management
The ability to proactively offer assistance promises to make personal agents more helpful to their users. We characterize the properties desired of proactive behaviour by a person...
Neil Yorke-Smith, Shahin Saadati, Karen L. Myers, ...
B
2007
Springer
14 years 4 months ago
Symmetry Reduction for B by Permutation Flooding
Symmetry reduction is an established method for limiting the amount of states that have to be checked during exhaustive model checking. The idea is to only verify a single represen...
Michael Leuschel, Michael J. Butler, Corinna Sperm...
BPM
2007
Springer
148views Business» more  BPM 2007»
14 years 4 months ago
Requirements-Driven Design and Configuration Management of Business Processes
The success of a business process (BP) depends on whether it meets its business goal as well as non-functional requirements associated with it. BP specifications frequently need to...
Alexei Lapouchnian, Yijun Yu, John Mylopoulos
EMSOFT
2007
Springer
14 years 4 months ago
The algebra of connectors: structuring interaction in BIP
We provide an algebraic formalisation of connectors in BIP. These are used to structure interactions in a component-based system. A connector relates a set of typed ports. Types a...
Simon Bliudze, Joseph Sifakis