Sciweavers

16404 search results - page 260 / 3281
» A set coverage problem
Sort
View
HASE
2008
IEEE
15 years 11 months ago
Using Multi-Level Security Annotations to Improve Software Assurance
Current annotation technologies suffer from poor coverage over the development process phases, limited support for the broad scope of the security requirement types and inadequate...
Eryk Kylikowski, Riccardo Scandariato, Wouter Joos...
ICPR
2008
IEEE
15 years 11 months ago
An extended version of the k-means method for overlapping clustering
This paper deals with overlapping clustering, a trade off between crisp and fuzzy clustering. It has been motivated by recent applications in various domains such as information r...
Guillaume Cleuziou
CLEF
2003
Springer
15 years 9 months ago
Cross Lingual QA: A Modular Baseline in CLEF 2003
We evaluate the feasibility of applying currently available research tools to the problem of cross lingual QA. We establish a task baseline by combining a cross lingual IR system w...
Lucian Vlad Lita, Monica Rogati, Jaime G. Carbonel...
SIGCSE
1991
ACM
98views Education» more  SIGCSE 1991»
15 years 8 months ago
Pictures as invariants
The development, specification, and use of a loop invariant are useful and underutilized tools in writing code to solve a problem or implement an algorithm. Invariants are especi...
Owen L. Astrachan
AIPS
2010
15 years 6 months ago
The More, the Merrier: Combining Heuristic Estimators for Satisficing Planning
The problem of effectively combining multiple heuristic estimators has been studied extensively in the context of optimal planning, but not in the context of satisficing planning....
Gabriele Röger, Malte Helmert