Sciweavers

4140 search results - page 792 / 828
» A Use Case Based Approach to Feature Models' Construction
Sort
View
POPL
2012
ACM
13 years 7 months ago
Programming with binders and indexed data-types
We show how to combine a general purpose type system for an existing language with support for programming with binders and contexts by refining the type system of ML with a rest...
Andrew Cave, Brigitte Pientka
ERCIMDL
2007
Springer
159views Education» more  ERCIMDL 2007»
15 years 6 months ago
Reducing Costs for Digitising Early Music with Dynamic Adaptation
Abstract. Optical music recognition (OMR) enables librarians to digitise early music sources on a large scale. The cost of expert human labour to correct automatic recognition erro...
Laurent Pugin, John Ashley Burgoyne, Ichiro Fujina...
ATAL
2005
Springer
15 years 5 months ago
Knowledge and social laws
In this paper we combine existing work in the area of social laws with a framework for reasoning about knowledge in multi-agent systems. The unifying framework in which this is do...
Wiebe van der Hoek, Mark Roberts, Michael Wooldrid...
QOFIS
2001
Springer
15 years 4 months ago
Constrained TCP-Friendly Congestion Control for Multimedia Communication
With the lack of admission control and resource reservation mechanisms in the Internet, overload situations can only be avoided by having the end systems deploying congestion cont...
Dorgham Sisalem, Adam Wolisz
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 6 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...