#### Filter Results:

- Full text PDF available (5)

#### Publication Year

1973

2016

- This year (0)
- Last 5 years (2)
- Last 10 years (3)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- M. Shing, V. Berzins, M. Holden, C. Eagle, Luqi
- ALET
- 1998

This paper describes the distance learning Software Engineering Master's program offered at the Naval Postgraduate School and presents the lessons from its first class. The program differs from the other software engineering programs in two ways: (1) the curriculum is developed specifically to meet the needs for formal software engineering education for DoD… (More)

1 Department of Combinatorics and Optimization, University of Waterloo, Waterloo, Ontario N2L 3G1, Canada email: {cjeagle@engmail.uwaterloo.ca, lbrichmond@math.uwaterloo.ca} 2 School of Mathematics and Statistics, Carleton University, Ottawa, Ontario K1S 5B6, Canada email: {zgao@math.carleton.ca, daniel@math.carleton.ca} 3 Department of Mathematics,… (More)

- Luqi, V. Berzins, M. Shing, N. Nada, C. Eagle
- 2000

This paper addresses the problem of how to produce reliable software that is also flexible and cost effective for the DoD distributed software domain. DoD software systems fall into two categories: information systems and war fighter systems. Both types of systems can be distributed, heterogeneous and network-based, consisting of a set of components running… (More)

- Christopher J. Eagle
- Ann. Pure Appl. Logic
- 2014

We describe an infinitary logic for metric structures which is analogous to Lω1,ω . We show that this logic is capable of expressing several concepts from analysis that cannot be expressed in finitary continuous logic. Using topological methods, we prove an omitting types theorem for countable fragments of our infinitary logic. We use omitting types to… (More)

We consider the mean and variance of the number of encryptions necessary over all subsets of privileged users to revoke a set of users in the complete subtree scheme (CST) and the subset-difference scheme (SD). These are well-known tree based broadcast encryption schemes. Park and Blake in: Journal of Discrete Algorithms, vol. 4, 2006, pp. 215–238 [4], give… (More)

- C J Eagle
- Current opinion in anaesthesiology
- 1998

Quality can be viewed from three perspectives: the requirements of the healthcare system; issues related to delivery of care, such as access; and methods used to measure quality, such as outcome analysis. These viewpoints can be applied to the anaesthetic literature to analyse the assessment of quality of care.

- Christopher J. Eagle, Ilijas Farah, Bradd Hart, Boris Kadets, Vladyslav Kalashnyk, Martino Lupini
- J. Symb. Log.
- 2016

We realize the Jiang-Su algebra, all UHF algebras, and the hyperfinite II1 factor as Fräıssé limits of suitable classes of structures. Moreover by means of Fräıssé theory we provide new examples of AF algebras with strong homogeneity properties. As a consequence of our analysis we deduce Ramsey-theoretic results about the class of full-matrix algebras.

- ‹
- 1
- ›