Results 1 - 10
of
214
The Journey to Business Process Compliance
, 2008
"... It is a typical scenario that many organisations have their business processes specified independently of their business obligations (which includes contractual obligations to business partners, as well as obligations a business has to fulfil against regulations and industry standards). This is beca ..."
Abstract
-
Cited by 42 (21 self)
- Add to MetaCart
the lack of mechanisms to check whether business processes are compliant with business contracts. The chapter begins by defining the space for business process compliance and the eco-system for ensuring that process are compliant. The key point is that compliance is a relationship between two sets
Compliance verification of agent interaction: a logic-based tool
- Applied Artificial Intelligence
, 2006
"... In open societies of agents, where agents are autonomous and heterogeneous, it is not realistic to assume that agents will always act so as to comply to interaction protocols. Thus, the need arises for a formalism to specify constraints on agent interaction, and for a tool able to observe and check ..."
Abstract
-
Cited by 47 (24 self)
- Add to MetaCart
In open societies of agents, where agents are autonomous and heterogeneous, it is not realistic to assume that agents will always act so as to comply to interaction protocols. Thus, the need arises for a formalism to specify constraints on agent interaction, and for a tool able to observe and check
On the Accuracy of Architecture Compliance Checking Support: Accuracy of Dependency Analysis and Violation Reporting
- in Proceedings of the 21st International Conference on Program Comprehension (ICPC
"... Abstract—Architecture Compliance Checking (ACC) is useful to bridge the gap between architecture and implementation. ACC is an approach to verify conformance of implemented program code to high-level models of architectural design. Static ACC focuses on the modular software architecture and on the e ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
Abstract—Architecture Compliance Checking (ACC) is useful to bridge the gap between architecture and implementation. ACC is an approach to verify conformance of implemented program code to high-level models of architectural design. Static ACC focuses on the modular software architecture
Final Processing Application Fees – Credit Card Payment Concept
"... Admissions uses Student Financials functionality to process payment of application fees. On the Application Data page you can process check, cash and credit card payments. The process allows you to enter full or partial payments and track the current status of a payment. This lesson covers how to pr ..."
Abstract
- Add to MetaCart
Admissions uses Student Financials functionality to process payment of application fees. On the Application Data page you can process check, cash and credit card payments. The process allows you to enter full or partial payments and track the current status of a payment. This lesson covers how
2 Název práce: Checking compliance of Java implementation with TBP Specification
, 2010
"... 2010 Words cannot express my gratitude to my advisor Pavel Parízek. I would like to thank Pavel for his personal and professional approach, useful advice and suggestions, assistance and because he opened area of verification to me. I would like to thank Kateřina Topilová for language corrections. Fi ..."
Abstract
- Add to MetaCart
2010 Words cannot express my gratitude to my advisor Pavel Parízek. I would like to thank Pavel for his personal and professional approach, useful advice and suggestions, assistance and because he opened area of verification to me. I would like to thank Kateřina Topilová for language corrections
Towards Compliance of Agents in Open Multi-Agent Systems
"... Abstract. With the introduction of large-scale open systems, the need for managing interactions between agents, and in particular for managing the entry of a new agent into an existing system, becomes an increasingly more important objective. Without such management, there may be significant implica ..."
Abstract
- Add to MetaCart
, and by the system itself to check that an agent entering a system complies with the system constraints. While not fully detailed, the paper provides an initial model and a clear direction as to how such a system may be constructed, offering a new way of developing open multi-agent systems. 1
The Choice at the Checkout: Quantifying Demand Across Payment Instruments
- International Journal of Industrial Organization
, 2008
"... Dramatic changes have occurred in the U.S. payment system over the past two decades, most notably an explosion in electronic card-based payments. Not surprisingly, this shift has been accompanied by a series of policy debates, all of which hinge critically on understanding consumer behavior at the p ..."
Abstract
-
Cited by 21 (0 self)
- Add to MetaCart
at the point of sale. Using a new nationally representative survey, we transform consumers ’ responses to open-ended questions on reasons for using debit cards to estimate a characteristics-based discrete-choice demand model that includes debit cards, cash, checks, and credit cards. Market shares computed
Using SCL to specify and check design intent in source code
- IEEE Transactions on Software Engineering
, 2006
"... Software developers often fail to respect the intentions of designers due to missing or ignored documentation of design intent. SCL (Structural Constraint Language) addresses this problem by enabling designers to formalize and confirm compliance with design intent. The designer expresses his intent ..."
Abstract
-
Cited by 35 (0 self)
- Add to MetaCart
Software developers often fail to respect the intentions of designers due to missing or ignored documentation of design intent. SCL (Structural Constraint Language) addresses this problem by enabling designers to formalize and confirm compliance with design intent. The designer expresses his
Verifying norm compliancy of protocols
- In Coordination, Organisation, Institutions and Norms in Agent Systems I. LNAI
, 2006
"... Abstract. There is a wide agreement on the use of norms in order to specify the expected behaviour of agents in open MAS. However, in highly regulated domains, where norms dictate what can and cannot be done, it can be hard to determine whether a desired goal can actually be achieved without violati ..."
Abstract
-
Cited by 5 (1 self)
- Add to MetaCart
results without violating the norms? In this paper we introduce a formal method, based on program verication, for checking the norm compliance of (knowledge-based) protocols. 1
Practical API Protocol Checking with Access Permissions
"... Reusable APIs often define usage protocols. We previously developed a sound modular type system that checks compliance with typestate-based protocols while affording a great deal of aliasing flexibility. We also developed Plural, a prototype tool that embodies our approach as an automated static an ..."
Abstract
-
Cited by 27 (11 self)
- Add to MetaCart
Reusable APIs often define usage protocols. We previously developed a sound modular type system that checks compliance with typestate-based protocols while affording a great deal of aliasing flexibility. We also developed Plural, a prototype tool that embodies our approach as an automated static
Results 1 - 10
of
214