• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 214
Next 10 →

The Journey to Business Process Compliance

by Guido Governatori, Shazia Sadiq , 2008
"... It is a typical scenario that many organisations have their business processes specified independently of their business obligations (which includes contractual obligations to business partners, as well as obligations a business has to fulfil against regulations and industry standards). This is beca ..."
Abstract - Cited by 42 (21 self) - Add to MetaCart
the lack of mechanisms to check whether business processes are compliant with business contracts. The chapter begins by defining the space for business process compliance and the eco-system for ensuring that process are compliant. The key point is that compliance is a relationship between two sets

Compliance verification of agent interaction: a logic-based tool

by Marco Alberti, Marco Gavanelli, Evelina Lamma, Università Di Ferrara, Via Saragat - Applied Artificial Intelligence , 2006
"... In open societies of agents, where agents are autonomous and heterogeneous, it is not realistic to assume that agents will always act so as to comply to interaction protocols. Thus, the need arises for a formalism to specify constraints on agent interaction, and for a tool able to observe and check ..."
Abstract - Cited by 47 (24 self) - Add to MetaCart
In open societies of agents, where agents are autonomous and heterogeneous, it is not realistic to assume that agents will always act so as to comply to interaction protocols. Thus, the need arises for a formalism to specify constraints on agent interaction, and for a tool able to observe and check

On the Accuracy of Architecture Compliance Checking Support: Accuracy of Dependency Analysis and Violation Reporting

by Leo Pruijt, Sjaak Brinkkemper - in Proceedings of the 21st International Conference on Program Comprehension (ICPC
"... Abstract—Architecture Compliance Checking (ACC) is useful to bridge the gap between architecture and implementation. ACC is an approach to verify conformance of implemented program code to high-level models of architectural design. Static ACC focuses on the modular software architecture and on the e ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
Abstract—Architecture Compliance Checking (ACC) is useful to bridge the gap between architecture and implementation. ACC is an approach to verify conformance of implemented program code to high-level models of architectural design. Static ACC focuses on the modular software architecture

Final Processing Application Fees – Credit Card Payment Concept

by Credit Card Payment. Doc
"... Admissions uses Student Financials functionality to process payment of application fees. On the Application Data page you can process check, cash and credit card payments. The process allows you to enter full or partial payments and track the current status of a payment. This lesson covers how to pr ..."
Abstract - Add to MetaCart
Admissions uses Student Financials functionality to process payment of application fees. On the Application Data page you can process check, cash and credit card payments. The process allows you to enter full or partial payments and track the current status of a payment. This lesson covers how

2 Název práce: Checking compliance of Java implementation with TBP Specification

by Pavel Jančík, Pavel Jančík, Pavel Jančík , 2010
"... 2010 Words cannot express my gratitude to my advisor Pavel Parízek. I would like to thank Pavel for his personal and professional approach, useful advice and suggestions, assistance and because he opened area of verification to me. I would like to thank Kateřina Topilová for language corrections. Fi ..."
Abstract - Add to MetaCart
2010 Words cannot express my gratitude to my advisor Pavel Parízek. I would like to thank Pavel for his personal and professional approach, useful advice and suggestions, assistance and because he opened area of verification to me. I would like to thank Kateřina Topilová for language corrections

Towards Compliance of Agents in Open Multi-Agent Systems

by Jorge Gonzalez-palacios, Michael Luck
"... Abstract. With the introduction of large-scale open systems, the need for managing interactions between agents, and in particular for managing the entry of a new agent into an existing system, becomes an increasingly more important objective. Without such management, there may be significant implica ..."
Abstract - Add to MetaCart
, and by the system itself to check that an agent entering a system complies with the system constraints. While not fully detailed, the paper provides an initial model and a clear direction as to how such a system may be constructed, offering a new way of developing open multi-agent systems. 1

The Choice at the Checkout: Quantifying Demand Across Payment Instruments

by Ron Borzekowski, Elizabeth K. Kiser - International Journal of Industrial Organization , 2008
"... Dramatic changes have occurred in the U.S. payment system over the past two decades, most notably an explosion in electronic card-based payments. Not surprisingly, this shift has been accompanied by a series of policy debates, all of which hinge critically on understanding consumer behavior at the p ..."
Abstract - Cited by 21 (0 self) - Add to MetaCart
at the point of sale. Using a new nationally representative survey, we transform consumers ’ responses to open-ended questions on reasons for using debit cards to estimate a characteristics-based discrete-choice demand model that includes debit cards, cash, checks, and credit cards. Market shares computed

Using SCL to specify and check design intent in source code

by Daqing Hou, H. James Hoover - IEEE Transactions on Software Engineering , 2006
"... Software developers often fail to respect the intentions of designers due to missing or ignored documentation of design intent. SCL (Structural Constraint Language) addresses this problem by enabling designers to formalize and confirm compliance with design intent. The designer expresses his intent ..."
Abstract - Cited by 35 (0 self) - Add to MetaCart
Software developers often fail to respect the intentions of designers due to missing or ignored documentation of design intent. SCL (Structural Constraint Language) addresses this problem by enabling designers to formalize and confirm compliance with design intent. The designer expresses his

Verifying norm compliancy of protocols

by Huib Aldewereld, Frank Dignum, John-jules Ch - In Coordination, Organisation, Institutions and Norms in Agent Systems I. LNAI , 2006
"... Abstract. There is a wide agreement on the use of norms in order to specify the expected behaviour of agents in open MAS. However, in highly regulated domains, where norms dictate what can and cannot be done, it can be hard to determine whether a desired goal can actually be achieved without violati ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
results without violating the norms? In this paper we introduce a formal method, based on program verication, for checking the norm compliance of (knowledge-based) protocols. 1

Practical API Protocol Checking with Access Permissions

by Kevin Bierhoff, Nels E. Beckman, Jonathan Aldrich
"... Reusable APIs often define usage protocols. We previously developed a sound modular type system that checks compliance with typestate-based protocols while affording a great deal of aliasing flexibility. We also developed Plural, a prototype tool that embodies our approach as an automated static an ..."
Abstract - Cited by 27 (11 self) - Add to MetaCart
Reusable APIs often define usage protocols. We previously developed a sound modular type system that checks compliance with typestate-based protocols while affording a great deal of aliasing flexibility. We also developed Plural, a prototype tool that embodies our approach as an automated static
Next 10 →
Results 1 - 10 of 214
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University