Sciweavers

13383 search results - page 2424 / 2677
» Abstractions from proofs
Sort
View
99
Voted
NDQA
2003
129views Education» more  NDQA 2003»
15 years 2 months ago
Knowledge Tracking: Answering Implicit Questions
Research on Question Answering has produced an arsenal of useful techniques for detecting answers that are explicitly present in the text of a collection of documents. To move bey...
Reinhard Stolle, Daniel G. Bobrow, Cleo Condoravdi...
128
Voted
OPODIS
2003
15 years 2 months ago
Detecting Temporal Logic Predicates in Distributed Programs Using Computation Slicing
Detecting whether a finite execution trace (or a computation) of a distributed program satisfies a given predicate, called predicate detection, is a fundamental problem in distr...
Alper Sen, Vijay K. Garg
126
Voted
DBSEC
2000
138views Database» more  DBSEC 2000»
15 years 2 months ago
Discovery of Multi-Level Security Policies
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce sec...
Christina Yip Chung, Michael Gertz, Karl N. Levitt
ECIS
2000
15 years 2 months ago
Diffusion of Internet Technologies in Travel Agencies in Australia
Abstract - The Internet appears to playing a role in the restructuring of some traditional business sectors in which some organisations profit and some decline. Travel agencies are...
Craig Standing, Thandarayan Vasudavan
113
Voted
OSDI
2000
ACM
15 years 2 months ago
Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java
Single-language runtime systems, in the form of Java virtual machines, are widely deployed platforms for executing untrusted mobile code. These runtimes provide some of the featur...
Godmar Back, Wilson C. Hsieh, Jay Lepreau
« Prev « First page 2424 / 2677 Last » Next »