Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 53, Issue 1January 2010
Publisher:
  • Oxford University Press, Inc.
  • 198 Madison Ave. New York, NY
  • United States
ISSN:0010-4620
Reflects downloads up to 06 Oct 2024Bibliometrics
Skip Table Of Content Section
editorial
research-article
A Hierarchy of Behavioral Equivalences in the π-calculus with Noisy Channels

The π-calculus is a process algebra where agents interact by sending communication links to each other via noiseless communication channels. Taking into account the reality of noisy channels, an extension of the π-calculus, called the πN-calculus, has ...

research-article
Congruence Formats for Weak Readiness Equivalence and Weak Possible Future Equivalence

Weak equivalences are important behavioral equivalences in the course of specifying and analyzing reactive systems using process algebraic languages. In this paper, we propose a series of weak equivalences named weak parametric readiness equivalences, ...

research-article
Slicing Execution with Partial Weakest Precondition for Model Abstraction of C Programs

Model abstraction plays an important role in model checking of source codes of programs. Slicing execution is a lightweight symbolic execution procedure to extract the models of C programs in an over-approximated way. In this paper, we present an ...

research-article
Special Interest Messaging

Hundreds of technical, special interest Internet weblogs are already generating thousands of niche articles worldwide, and many institutions are starting to create internal blogs for team collaboration. As this style of communication becomes more ...

research-article
Using the Relational Model to Capture Topological Information of Spaces

Motivated by research on how topology may be a helpful foundation for building information modelling, a relational database version of the notions of chain complex and chain complex morphism is defined and used for storing cw-complexes and their ...

research-article
Multiparty Contracts

To implement an interorganizational process between different enterprizes, one needs to agree on the ‘rules of engagement’. These can be specified in terms of a contract that describes the overall intended process and the duties of all parties involved. ...

research-article
Some Extensions on Threshold Visual Cryptography Schemes

Droste [CRYPTO’96] proposed a construction of threshold visual cryptography scheme (TVCS) under the visual cryptography model of Naor and Shamir, i.e. the visual cryptography model with the underlying operation OR. In this article, we give three ...

research-article
Mum Effect as an Offshore Outsourcing Risk

Mum effect is the risk arising from project members’ reluctance to report negative information. We investigate the cultural factors contributing to this risk in offshore outsourcing. The study was conducted in Thailand with participation from both ...

Comments