Results 21 to 30 of about 2,784,953 (338)

Development of Private Processes: A Refinement Approach

open access: yesIEEE Access, 2019
Private processes are the basis to construct the collaborative business processes, and their correctness has a direct impact on the correctness of collaborative business processes.
Qi Mo   +5 more
doaj   +1 more source

Correctness and completeness of logic programs [PDF]

open access: yes, 2015
We discuss proving correctness and completeness of definite clause logic programs. We propose a method for proving completeness, while for proving correctness we employ a method which should be well known but is often neglected.
Drabent, Włodzimierz
core   +1 more source

A Correctness Enforcement Approach for Collaborative Business Processes

open access: yesIEEE Access, 2019
Collaborative business processes are indeed complex and difficult to be correctly designed as business processes involved in them are typically developed by different participating organizations and there is no way to foresee all potential interactions ...
Qi Mo   +5 more
doaj   +1 more source

Admit your weakness: Verifying correctness on TSO architectures [PDF]

open access: yes, 2015
“The final publication is available at http://link.springer.com/chapter/10.1007%2F978-3-319-15317-9_22 ”.Linearizability has become the standard correctness criterion for fine-grained non-atomic concurrent algorithms, however, most approaches assume a ...
A Gotsman   +17 more
core   +1 more source

Working Behind Bars, General Rules for Penitentiary Employees

open access: yesJournal of Danubian Studies and Research, 2021
At first glance, working in a penitentiary unit seems quite simple: the employees provides security, accommodation, food, hygiene items, clothing when needed and the possibility of daily recreation for the imprisoned persons and inmates are waiting for
Florin Proca
doaj  

Computational Intention

open access: yesStudies in Logic, Grammar and Rhetoric, 2020
The core entities of computer science include formal languages, spec-ifications, models, programs, implementations, semantic theories, type inference systems, abstract and physical machines.
Turner Raymond
doaj   +1 more source

Correctness of an STM Haskell implementation [PDF]

open access: yes, 2012
A concurrent implementation of software transactional memory in Concurrent Haskell using a call-by-need functional language with processes and futures is given.
Bieniusa A.   +7 more
core   +3 more sources

Defuzzification Strategies for Fuzzy Classifications of Remote Sensing Data

open access: yesRemote Sensing, 2016
The classes in fuzzy classification schemes are defined as fuzzy sets, partitioning the feature space through fuzzy rules, defined by fuzzy membership functions.
Peter Hofmann
doaj   +1 more source

Avoiding coincidental correctness in boundary value analysis [PDF]

open access: yes, 2006
In partition analysis we divide the input domain to form subdomains on which the system's behaviour should be uniform. Boundary value analysis produces test inputs near each subdomain's boundaries to find failures caused by incorrect implementation of ...
Hierons, RM
core   +1 more source

Ranking Generated Summaries by Correctness: An Interesting but Challenging Application for Natural Language Inference

open access: yesAnnual Meeting of the Association for Computational Linguistics, 2019
While recent progress on abstractive summarization has led to remarkably fluent summaries, factual errors in generated summaries still severely limit their use in practice.
Tobias Falke   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy