Sciweavers

53390 search results - page 10604 / 10678
» Computer Systems Analysis
Sort
View
AAECC
2003
Springer
139views Algorithms» more  AAECC 2003»
15 years 8 months ago
Fighting Two Pirates
A pirate is a person who buys a legal copy of a copyrighted work and who reproduces it to sell illegal copies. Artists and authors are worried as they do not get the income which i...
Hans Georg Schaathun
AGTIVE
2003
Springer
15 years 8 months ago
Specifying Pointer Structures by Graph Reduction
Graph-reduction specifications (GRSs) are a powerful new method for specifying classes of pointer data structures (shapes). They cover important shapes, like various forms of bal...
Adam Bakewell, Detlef Plump, Colin Runciman
ATAL
2003
Springer
15 years 8 months ago
Optimal agendas for multi-issue negotiation
There are two ways of handling bilateral multi-issue negotiations – one is to negotiate all the issues together, and the other is to negotiate them one by one. The order in whic...
S. Shaheen Fatima, Michael Wooldridge, Nicholas R....
ATAL
2003
Springer
15 years 8 months ago
Natural methods for robot task learning: instructive demonstrations, generalization and practice
Among humans, teaching various tasks is a complex process which relies on multiple means for interaction and learning, both on the part of the teacher and of the learner. Used tog...
Monica N. Nicolescu, Maja J. Mataric
DBISP2P
2003
Springer
105views Database» more  DBISP2P 2003»
15 years 8 months ago
Distributed Queries and Query Optimization in Schema-Based P2P-Systems
Databases have employed a schema-based approach to store and retrieve structured data for decades. For peer-to-peer (P2P) networks, similar approaches are just beginning to emerge,...
Ingo Brunkhorst, Hadhami Dhraief, Alfons Kemper, W...
« Prev « First page 10604 / 10678 Last » Next »