Sciweavers

13987 search results - page 38 / 2798
» The Two Guards Problem
Sort
View
DBSEC
2008
129views Database» more  DBSEC 2008»
13 years 9 months ago
Sharing but Protecting Content Against Internal Leakage for Organisations
Abstract. Dishonest employees, who have privileges to obtain corporate critical information and access internal resources, cause the problem of internal leakage. Employees, who hav...
Muntaha Alawneh, Imad M. Abbadi
ROOM
2000
13 years 9 months ago
On the Compositional Properties of UML Statechart Diagrams
This paper proposes a revised semantic interpretation of UML Statechart Diagrams which ensures, under the specified design rules, that Statecharts may be constructed to have true ...
Anthony J. H. Simons
FMSD
2008
64views more  FMSD 2008»
13 years 7 months ago
Robust safety of timed automata
Timed automata are governed by an idealized semantics that assumes a perfectly precise behavior of the clocks. The traditional semantics is not robust because the slightest perturb...
Martin De Wulf, Laurent Doyen, Nicolas Markey, Jea...
CORR
2009
Springer
100views Education» more  CORR 2009»
13 years 5 months ago
Programming Idioms for Transactional Events
Transactional events (TE) are an extension of Concurrent ML (CML), a programming model for synchronous message-passing. Prior work has focused on TE's formal semantics and it...
Matthew Kehrt, Laura Effinger-Dean, Michael Schmit...
CIS
2006
Springer
13 years 11 months ago
A New Multi-objective Evolutionary Optimisation Algorithm: The Two-Archive Algorithm
Many Multi-Objective Evolutionary Algorithms (MOEAs) have been proposed in recent years. However, almost all MOEAs have been evaluated on problems with two to four objectives only...
Kata Praditwong, Xin Yao