Filters








14,738 Hits in 7.0 sec

A Tile Logic Based Approach for Software Architecture Description Analysis

Aïcha Choutri, Faiza Belala, Kamel Barkaoui
2010 Journal of Software Engineering and Applications  
Languages Tile logic has been exploited as a common semantic framework to define both abstract software architectures and their behaviors [16] .  ...  This will help us then to give more precise and complete definition of all different LfP architectural elements semantics in Tile logic based framework.  ...  practical checking tools [21,2 way to several other perspectives such as semantics enrichment of LfP component behaviour under particular constraints such dynamic reco  ... 
doi:10.4236/jsea.2010.311126 fatcat:b4gqvgucoffv3jaobcyxjibqca

Security Policy Definition Framework for SOA-Based Systems [chapter]

Bartosz Brodecki, Piotr Sasak, Michał Szychowiak
2009 Lecture Notes in Computer Science  
Security policy framework for SOA In this section we attempt to define key requirements for a SOA-compliant security policy framework and language.  ...  We also define a policy language destined to fulfill all recognized requirements and give a brief overview of its syntax.  ...  The presented framework differs from most existing policy frameworks in focusing on aspects crucial for SOA-based systems, such as high modularity and extensibility, multilayered language design and support  ... 
doi:10.1007/978-3-642-04409-0_57 fatcat:so5guejthveshh3fc4z5rwyit4

Reasoning with semantics-aware access control policies for geospatial web services

Ashraful Alam, Ganesh Subbiah, Bhavani Thuraisingam, Latifur Khan
2006 Proceedings of the 3rd ACM workshop on Secure web services - SWS '06  
We define a modular access control policy framework in the context of geospatial data integration platforms.  ...  Geospatial semantic Web services can employ the framework to enforce resource access and intelligently make decisions about policy rules.  ...  In contrast to the XML-based standards and first-order logic-based access controls, we define the axioms in OWL-DL and the emphasis on policy reuse.  ... 
doi:10.1145/1180367.1180380 dblp:conf/sws/AlamSTK06 fatcat:ywb3dj7n6bhnffxiomzhqqthxu

A Comparative Study of Using Object Oriented Approach and aspect Oriented Approach for the Evolution of Legacy System

Dr S.A.M. Rizvi, Zeba Khanam
2010 International Journal of Computer Applications  
The challenge in today's environment is to develop a methodology to migrate older systems to newer, more cost effective client-server distributed processing platforms that support standards-based modular  ...  Nowadays much of the work is carried on, on developing different methodologies to enable aspect oriented programming to be applied to legacy systems.  ...  AOP states that programming languages based on any single abstraction framework, procedures, constraints, whatever -are ultimately inadequate for many complex systems [7] In AOP, the different aspects  ... 
doi:10.5120/158-281 fatcat:45jkcofspvhv3jkwaajvr6od3a

Flexible integration of data qualities in wireless sensor networks

Nelson Matthys, Christophe Huygens, Danny Hughes, Sam Michiels, Wouter Joosen
2009 Proceedings of the 4th International Workshop on Middleware Tools, Services and Run-Time Support for Sensor Networks - MidSens '09  
This paper advocates a high-level policy-based approach to more easily support the specification and enforcement of these non-functional requirements in existing component compositions for network embedded  ...  We have realized and evaluated a prototype of this framework for the LooCI component model.  ...  Acknowledgments Research for this paper was partially funded by the Interuniversity Attraction Poles Programme Belgian State, Belgian Science Policy, Research Fund K.U.Leuven, and is conducted in the context  ... 
doi:10.1145/1658192.1658198 dblp:conf/middleware/MatthysHHMJ09 fatcat:ghmyhwfn4fhwplsckjjrqsvije

Nano-kernel: A Dynamically Reconfigurable Kernel for WSN

Susmit Bagchi
2008 Proceedings of the 1st International ICST Conference on Mobile Wireless Middleware, Operating Systems and Applications  
Based on the modular design approach, an implementation direction is outlined.  ...  Such sensor devices have to adapt to the changing environment at deployment site and need dynamic reconfiguration.  ...  TinyOS uses a modularized static programming language, nesC, which analyzes the code and handles the concurrency issues within the language and not in the user space [1] [3] .  ... 
doi:10.4108/icst.mobilware2008.2500 dblp:conf/mobilware/Bagchi08 fatcat:weces2jm5va5hprq3sq2f6u5ri

ADVISER: A Dialog System Framework for Education & Research

Daniel Ortega, Dirk Väth, Gianna Weber, Lindsey Vanderlyn, Maximilian Schmidt, Moritz Völkel, Zorica Karacevic, Ngoc Thang Vu
2019 Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics: System Demonstrations  
In this paper, we present ADVISER 1 -an open source dialog system framework for education and research purposes. This system supports multi-domain task-oriented conversations in two languages.  ...  user interface supporting nontechnical users.  ...  Acknowledgments We would like to thank all the voluntary students at the University of Stuttgart for their participation in the evaluation. This work was funded by the Carl Zeiss Foundation.  ... 
doi:10.18653/v1/p19-3016 dblp:conf/acl/OrtegaVWVSVKV19 fatcat:64piuwxmdjehzgnbbmehf2lp5a

Page 1580 of Linguistics and Language Behavior Abstracts: LLBA Vol. 26, Issue 3 [page]

1992 Linguistics and Language Behavior Abstracts: LLBA  
abili- ty, natural language interfaces to expert systems; 9206743 speech-to-speech machine translation, SPEECH TRANS system descrip- tion, noise/ pragmatics accommodation problems; 920601 1 temporal expressions  ...  logic grammars, semantic interface parameters, natural language un- derstanding systems link; 9206239 mathematics, semiotic foundation formalization; 9207295 meaning theories, New Testament semantics  ... 

Reasoning about Programs With Effects

Carolyn Talcott
1998 Electronical Notes in Theoretical Computer Science  
Functional programming languages extended with imperative features include languages like Scheme and ML as well as object-based languages such as Java.  ...  The work on components of open distributed systems has been based on the actor model of computation and has focused on developing semantic models for modular speci cation and composition of actor systems  ...  in 37] can be carried out naturally within a variable type framework.  ... 
doi:10.1016/s1571-0661(05)80243-9 fatcat:b6mazjhf2rao3erdapa3qcwoti

A Modularity and Extensibility Analysis on Authorization Frameworks

Eduardo Martins Guerra, Jefferson O. Silva, Clovis Torres Fernandes
2016 Journal of Information Security and Cryptography (Enigma)  
This<br />analysis uses a motivating example to present the main industry<br />frameworks and consider the fulfillment of modularity,<br />extensibility and granularity requirements facing its suitability  ...  However, some authorization requirements,<br />present on recent applications, have demanded for software<br />systems to be able to handle security policies of multiple access<br />control models.  ...  Frameworks that base their logic decisions on the class metadata that they are working with are called metadata-based frameworks [5] .  ... 
doi:10.17648/enig.v2i1.46 fatcat:aj735nruwbhdlayffsmceg2czu

Page 2654 of Linguistics and Language Behavior Abstracts: LLBA Vol. 28, Issue 5 [page]

1994 Linguistics and Language Behavior Abstracts: LLBA  
A Shopper's Guide; 9410783 Katz, J., The Metaphysics of Meaning précis/commentary /rejoinders; 9411756 language focus, linguistics, natural semantic metalanguage framework, semantic primitives-based human  ...  Biihler’s semasiology evolution; 9411718 structure iconicity, analogy-/modularity-based universal grammar; 9411733 text classification, semiotic approach, J.-M.  ... 

Policy-enforced linking of untrusted components

Eunyoung Lee, Andrew W. Appe
2003 Proceedings of the 9th European software engineering conference held jointly with 10th ACM SIGSOFT international symposium on Foundations of software engineering - ESEC/FSE '03  
We show how to describe such policies in a linking logic that is modular and provably sound, and enforce these at link time, and a prototype implementation using the framework.  ...  Policy examples. One could use our framework, in building a system from components, to specify and enforce policies such as,  ...  Object-based frameworks such as COM or languages such as Java provide component models based on objects. They permit access control at the level of class, method, or data field.  ... 
doi:10.1145/940071.940124 dblp:conf/sigsoft/LeeA03 fatcat:ztsaj6wwejf4ractstjklkpytu

Policy-enforced linking of untrusted components

Eunyoung Lee, Andrew W. Appe
2003 Proceedings of the 9th European software engineering conference held jointly with 10th ACM SIGSOFT international symposium on Foundations of software engineering - ESEC/FSE '03  
We show how to describe such policies in a linking logic that is modular and provably sound, and enforce these at link time, and a prototype implementation using the framework.  ...  Policy examples. One could use our framework, in building a system from components, to specify and enforce policies such as,  ...  Object-based frameworks such as COM or languages such as Java provide component models based on objects. They permit access control at the level of class, method, or data field.  ... 
doi:10.1145/940117.940124 fatcat:pqsuzy4k2nhlzbsvsh34vf2rhm

Policy-enforced linking of untrusted components

Eunyoung Lee, Andrew W. Appe
2003 Software engineering notes  
We show how to describe such policies in a linking logic that is modular and provably sound, and enforce these at link time, and a prototype implementation using the framework.  ...  Policy examples. One could use our framework, in building a system from components, to specify and enforce policies such as,  ...  Object-based frameworks such as COM or languages such as Java provide component models based on objects. They permit access control at the level of class, method, or data field.  ... 
doi:10.1145/949952.940124 fatcat:t4dg55dbu5cjlpds6tuyhpbtvy

Gym-Ignition: Reproducible Robotic Simulations for Reinforcement Learning [article]

Diego Ferigo, Silvio Traversaro, Giorgio Metta, Daniele Pucci
2019 arXiv   pre-print
This paper presents Gym-Ignition, a new framework to create reproducible robotic environments for reinforcement learning research.  ...  Environments expose the common OpenAI Gym interface, making them compatible out-of-the-box with third-party frameworks containing reinforcement learning algorithms.  ...  In order to overcome this limitation, the simplest solution is to avoid as much as possible socket-based protocols. Modularity -Reinforcement learning is one of the most generic learning frameworks.  ... 
arXiv:1911.01715v2 fatcat:a2j6ma2eezanzfhwnnrgcjzux4
« Previous Showing results 1 — 15 out of 14,738 results