Sciweavers

5198 search results - page 1039 / 1040
» A Logic of Agent Programs
Sort
View
DIAGRAMS
2006
Springer
13 years 8 months ago
From Diagrams to Models by Analogical Transfer
Abstract. We present a method for constructing a teleological model of a drawing of a physical device through analogical transfer of the teleological model of the same device in an...
Patrick W. Yaner, Ashok K. Goel
ACSW
2006
13 years 7 months ago
Catching spam before it arrives: domain specific dynamic blacklists
1 The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organisations and possibly an increasin...
Duncan Cook, Jacky Hartnett, Kevin Manderson, Joel...
CORR
2008
Springer
141views Education» more  CORR 2008»
13 years 6 months ago
Truthful Unsplittable Flow for Large Capacity Networks
The unsplittable flow problem is one of the most extensively studied optimization problems in the field of networking. An instance of it consists of an edge capacitated graph and ...
Yossi Azar, Iftah Gamzu, Shai Gutner
BMCBI
2007
177views more  BMCBI 2007»
13 years 6 months ago
Biowep: a workflow enactment portal for bioinformatics applications
Background: The huge amount of biological information, its distribution over the Internet and the heterogeneity of available software tools makes the adoption of new data integrat...
Paolo Romano 0001, Ezio Bartocci, Guglielmo Bertol...
TSE
2008
165views more  TSE 2008»
13 years 6 months ago
A Systematic Study of Failure Proximity
Software end users are the best testers, who keep revealing bugs in software that has undergone rigorous in-house testing. In order to leverage their testing efforts, failure repor...
Chao Liu 0001, Xiangyu Zhang, Jiawei Han
« Prev « First page 1039 / 1040 Last » Next »