نتایج جستجو برای: axiomatic

تعداد نتایج: 7135  

2015
Yinni Guo

This chapter introduces a new usability evaluation method, the axiomatic evaluation method, which is developed based on the axiomatic design theory – a formalized design methodology that can be used to solve a variety of design problems. This new evaluation method examines three domains of a product: customer domain, functional domain, and control domain. This method investigates not only usabi...

Journal: :Transactions of the SDPS 2002
Yong Zeng

In this paper, an axiomatic theory is established for studying design. Using this theory, a formal model of design is derived to represent the syntactic structure of hierarchical evolving design objects and the dynamic design process. The axiomatic theory can be used by design theorists and computer scientists as a formal logical tool to model design whereas the derived formal model can be used...

2005
Lluis Godo Adriana Zapico

In Possibilistic Decision Theory (PDT), decisions are ranked by a pessimistic and an optimistic qualitative criteria. The preference relations induced by these criteria have been axiomatized by corresponding sets of rationality postulates, both à la Neumann-Morgenstern and à la Savage. In this paper we first address a particular issue regarding the axiomatic systems of PDT à la von Neumann and ...

2002
Makoto Kikuchi Ichiro Nagasaka

Yoshikawa’s General Design Theory is an axiomatic theory of design in which design is formulated and discussed in terms of topological spaces defined by entities, entity concepts, and abstract concepts. The theory is developed on declarations called definitions and axioms of which represents the basic philosophy of the theory. In this paper, we shall show that a paradoxical situation about the ...

1996
John Hale Jody Threet Sujeet Shenoi

High assurance security is extremely diicult to acheive in distributed computer systems due to their inherent non-determinism and heterogeneity. The practical application of formal methods is the key to high assurance security in open, distributed environments. This paper presents a methodology that applies formal methods within a dual framework to achieve secure interoperation of heterogeneous...

1996
John Hale Jody Threet Sujeet Shenoi

High assurance security is extremely di cult to acheive in distributed computer systems due to their inherent non-determinism and heterogeneity. The practical application of formal methods is the key to high assurance security in open, distributed environments. This paper presents a methodology that applies formal methods within a dual framework to achieve secure interoperation of heterogeneous...

2003
A. A. SIMANOVSKY

A data schema is a set of constructs that emulate relations between domain instances. Schema evolution is changes in the data schema and a system of data consistency support for such modifications. Axiomatic model regulates modifications and maintains data consistency by ensuring that the data schema always satisfies a set of axioms. This paper is an extension to previous work, which has define...

Journal: :Information and Computation 1993

Journal: :Proceedings of the ACM on Programming Languages 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید