نتایج جستجو برای: oriented

تعداد نتایج: 128980  

Journal: :SIAM Journal on Discrete Mathematics 2022

This paper considers completions of tope graphs complexes oriented matroids (COMs) to ample partial cubes the same Vapnik--Chervonenkis dimension (VC-dimension). We show that these exist for (OMs) and uniform (CUOMs). implies OMs CUOMs satisfy sample compression conjecture---one central open questions learning theory. conjecture graph every COM can be completed an cube without increasing VC-dim...

Journal: :Bulletin of University of Agricultural Sciences and Veterinary Medicine Cluj-Napoca. Horticulture 2015

Journal: :fteval Journal for Research and Technology Policy Evaluation 2017

Journal: :Journal of Experimental Psychology: Learning, Memory, and Cognition 2018

2005
Aliaksei Yanchuk Alexander Ivanyukovich Maurizio Marchese

Leveraging service oriented programming paradigm would significantly affect the way people build software systems. This paper contributes to the above goal proposing a lightweight formal framework capable of capturing the essential components of service-oriented programming paradigm.

2005
Massimiliano Colombo Elisabetta Di Nitto Massimiliano Di Penta Damiano Distante Maurilio Zuccalà

The diffusion of service-oriented computing is today heavily influencing many software development and research activities. Despite this, service-oriented computing is a relatively new field, where many aspects still suffer from a lack of standardization. Also, the service-oriented approach is bringing together researchers from different communities or from organizations having developed their ...

Journal: :Information & Software Technology 2009
Geri Georg Indrakshi Ray Kyriakos Anastasakis Behzad Bordbar Manachai Toahchoodee Siv Hilde Houmb

We propose a methodology, based on Aspect-Oriented Modeling (AOM), for incorporating security mechanisms in an application. The functionality of the application is described using the primary model and the attacks are specified using aspects. The attack aspect is composed with the primary model to obtain the misuse model. The misuse model describes how much the application can be compromised. I...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید