Sciweavers

Share
ACSC
2002
IEEE
8 years 9 months ago
Alias Analysis for Exceptions in Java
We propose a flow-sensitive alias analysis algorithm that computes safe and efficient alias sets in Java. For that, we propose a references-set representation of aliased elements,...
Jehak Woo, Jongwook Woo, Isabelle Attali, Denis Ca...
ACSC
2002
IEEE
8 years 9 months ago
Reducing Cognitive Overhead on the World Wide Web
HyperScout, a Web application, is an intermediary between a server and a client. It intercepts a page to the client, gathers information on each link, and annotates each link with...
R. J. Witt, S. P. Tyerman
ACSC
2002
IEEE
8 years 9 months ago
Music Ranking Techniques Evaluated
Alexandra L. Uitdenbogerd, Justin Zobel
ACSC
2002
IEEE
8 years 9 months ago
Representation and Reasoning for Goals in BDI Agents
A number of agent-oriented programming systems are based on a framework of beliefs, desires and intentions (BDI) and more explicitly on the BDI logic of Rao and Georgeff. In this ...
John Thangarajah, Lin Padgham, James Harland
ACSC
2002
IEEE
8 years 9 months ago
Specifying Mode Requirements of Embedded Systems
This paper presents a formal notation for specifying requirements of embedded systems which exhibit continuous, real-time behaviour and move through various modes under digital co...
G. Smith
ACSC
2002
IEEE
8 years 9 months ago
A Generalised Spreadsheet Verification Methodology
Although spreadsheets have been around for over thirty years, we are only just realising their importance. Most companies use spreadsheets in their decision-making processes, but ...
Nick Randolph, John Morris, Gareth Lee
ACSC
2002
IEEE
8 years 9 months ago
Intelligent Agents for Automated One-to-Many e-Commerce Negotiation
Negotiation is a process in which two or more parties with different criteria, constraints, and preferences, jointly reach an agreement on the terms of a transaction. Many current...
Iyad Rahwan, Ryszard Kowalczyk, H. H. Pham
ACSC
2002
IEEE
8 years 9 months ago
A Functional Taxonomy for Software Watermarking
Jasvir Nagra, Clark D. Thomborson, Christian S. Co...
ACSC
2002
IEEE
8 years 9 months ago
Learning and the Reflective Journal in Computer Science
This paper describes the use of the reflective journal in a computer programming course at the University of South Australia. We describe rationale for the journal relating it to ...
S. E. George
ACSC
2002
IEEE
8 years 9 months ago
AdJava - Automatic Distribution of Java Applications
The majority of the world’s computing resources remains idle most of the time. By using this resource pool, an individual computation may be completed in a fraction of time requ...
Mohammad M. Fuad, Michael J. Oudshoorn
books