Sciweavers

30 search results - page 3 / 6
» From Proof Nets to the Free *-Autonomous Category
Sort
View
KBSE
2005
IEEE
13 years 11 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
GIR
2006
ACM
13 years 11 months ago
Inferring Geographical Ontologies from Multiple Resources for Geographical Information Retrieval
Many documents that can be found in the World Wide Web include some kind of geographical information, often in an implicit way. The use of resources like gazetteers and geographic...
Davide Buscaldi, Paolo Rosso, Piedachu Peris
FUNGAMES
2010
13 years 6 months ago
ajME: making game engines autonomic
Autonomic Computing is now showing its value as a solution to the increased complexities of maintaining computer systems and has been applied to many different fields. In this pap...
Pedro Martins, Julie A. McCann
GECCO
2010
Springer
173views Optimization» more  GECCO 2010»
13 years 9 months ago
The baldwin effect in developing neural networks
The Baldwin Effect is a very plausible, but unproven, biological theory concerning the power of learning to accelerate evolution. Simple computational models in the 1980’s gave...
Keith L. Downing
EMNLP
2008
13 years 7 months ago
Online Word Games for Semantic Data Collection
Obtaining labeled data is a significant obstacle for many NLP tasks. Recently, online games have been proposed as a new way of obtaining labeled data; games attract users by being...
David Vickrey, Aaron Bronzan, William Choi, Aman K...