Results 21 to 30 of about 2,784,953 (338)
Development of Private Processes: A Refinement Approach
Private processes are the basis to construct the collaborative business processes, and their correctness has a direct impact on the correctness of collaborative business processes.
Qi Mo +5 more
doaj +1 more source
Correctness and completeness of logic programs [PDF]
We discuss proving correctness and completeness of definite clause logic programs. We propose a method for proving completeness, while for proving correctness we employ a method which should be well known but is often neglected.
Drabent, Włodzimierz
core +1 more source
A Correctness Enforcement Approach for Collaborative Business Processes
Collaborative business processes are indeed complex and difficult to be correctly designed as business processes involved in them are typically developed by different participating organizations and there is no way to foresee all potential interactions ...
Qi Mo +5 more
doaj +1 more source
Admit your weakness: Verifying correctness on TSO architectures [PDF]
“The final publication is available at http://link.springer.com/chapter/10.1007%2F978-3-319-15317-9_22 ”.Linearizability has become the standard correctness criterion for fine-grained non-atomic concurrent algorithms, however, most approaches assume a ...
A Gotsman +17 more
core +1 more source
Working Behind Bars, General Rules for Penitentiary Employees
At first glance, working in a penitentiary unit seems quite simple: the employees provides security, accommodation, food, hygiene items, clothing when needed and the possibility of daily recreation for the imprisoned persons and inmates are waiting for
Florin Proca
doaj
The core entities of computer science include formal languages, spec-ifications, models, programs, implementations, semantic theories, type inference systems, abstract and physical machines.
Turner Raymond
doaj +1 more source
Correctness of an STM Haskell implementation [PDF]
A concurrent implementation of software transactional memory in Concurrent Haskell using a call-by-need functional language with processes and futures is given.
Bieniusa A. +7 more
core +3 more sources
Defuzzification Strategies for Fuzzy Classifications of Remote Sensing Data
The classes in fuzzy classification schemes are defined as fuzzy sets, partitioning the feature space through fuzzy rules, defined by fuzzy membership functions.
Peter Hofmann
doaj +1 more source
Avoiding coincidental correctness in boundary value analysis [PDF]
In partition analysis we divide the input domain to form subdomains on which the system's behaviour should be uniform. Boundary value analysis produces test inputs near each subdomain's boundaries to find failures caused by incorrect implementation of ...
Hierons, RM
core +1 more source
While recent progress on abstractive summarization has led to remarkably fluent summaries, factual errors in generated summaries still severely limit their use in practice.
Tobias Falke +4 more
semanticscholar +1 more source

