— Increasingly, licensing and safety regulatory bodies require the suppliers of software-intensive, safety-critical systems to provide an explicit software safety case – a stru...
Abstract. We classify component-based models of computation into component models and interface models. A component model speci es for each component how the component behaves in a...
As technology becomes more embedded in our daily lives, there is a great deal of hope about the use of information technology to achieve positive community outcomes like increasin...
Cecelia Merkel, Lu Xiao, Umer Farooq, Craig H. Gan...
Abstract. This paper explores the role of transactive memory in enabling knowledge transfer between globally distributed teams. While the information systems literature has recentl...
In many negotiation and bargaining scenarios, a particular agent may need to interact repeatedly with another agent. Typically, these interactions take place under incomplete info...