Sciweavers

2797 search results - page 333 / 560
» Control Structures
Sort
View
CICLING
2009
Springer
16 years 4 months ago
Generating Executable Scenarios from Natural Language
Abstract. Bridging the gap between the specification of software requirements and actual execution of the behavior of the specified system has been the target of much research in r...
Michal Gordon, David Harel
CHI
2003
ACM
16 years 4 months ago
Containers: a new hierarchical model for browser interfaces
The development of a low bandwidth, high error tolerant neural browser, called the BrainBrowser, has raised new navigational issues. With this paradigm shift of twodimensional spa...
Chad Owens
TACAS
2009
Springer
134views Algorithms» more  TACAS 2009»
15 years 11 months ago
Computing Weakest Strategies for Safety Games of Imperfect Information
CEDAR (Counter Example Driven Antichain Refinement) is a new symbolic algorithm for computing weakest strategies for safety games of imperfect information. The algorithm computes ...
Wouter Kuijper, Jaco van de Pol
CIDM
2009
IEEE
15 years 11 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
SASO
2009
IEEE
15 years 11 months ago
Myconet: A Fungi-Inspired Model for Superpeer-Based Peer-to-Peer Overlay Topologies
Abstract—Unstructured peer-to-peer networks can be extremely flexible, but, because of size, complexity, and high variability in peers’ capacity and reliability, it is a conti...
Paul L. Snyder, Rachel Greenstadt, Giuseppe Valett...