Sciweavers

1061 search results - page 150 / 213
» A general definition of malware
Sort
View
EMSOFT
2008
Springer
15 years 1 months ago
Interface theories with component reuse
Interface theories have been proposed to support incremental design and independent implementability. Incremental design means that the compatibility checking of interfaces can pr...
Laurent Doyen, Thomas A. Henzinger, Barbara Jobstm...
ESWS
2008
Springer
15 years 1 months ago
Concept Search: Semantics Enabled Syntactic Search
Abstract. Historically, information retrieval (IR) has followed two principally different paths that we call syntactic IR and semantic IR. In syntactic IR, terms are represented as...
Fausto Giunchiglia, Uladzimir Kharkevich, Ilya Zai...
BCSHCI
2008
15 years 1 months ago
Innovations in measuring accessibility: theoretical and practical perspectives
Recently, there has been an increased awareness in the general public, in government and in business that people with disabilities and older people have distinct needs and prefere...
Helen Petrie, Christopher Power, Ray Adams, Fausti...
DGO
2007
174views Education» more  DGO 2007»
15 years 1 months ago
A bootstrapping approach for identifying stakeholders in public-comment corpora
A stakeholder is an individual, group, organization, or community that has an interest or stake in a consensus-building process. The goal of stakeholder identification is identify...
Jaime Arguello, Jamie Callan
SPLC
2010
15 years 1 months ago
Consistent Product Line Configuration across File Type and Product Line Boundaries
Creating a valid software configuration of a product line can require laborious customizations involving multiple configuration file types, such as feature models, domain-specific ...
Christoph Elsner, Peter Ulbrich, Daniel Lohmann, W...