Sciweavers

1518 search results - page 228 / 304
» Cryptographic Test Correction
Sort
View
111
Voted
WSC
2007
15 years 3 months ago
An exploration-based taxonomy for emergent behavior analysis in simulations
Emergent behaviors in simulations require explanation, so that valid behaviors can be separated from design or coding errors. We present a taxonomy, to be applied to emergent beha...
Ross Gore, Paul F. Reynolds Jr.
CAISE
2008
Springer
15 years 2 months ago
A New Paradigm for the Enactment and Dynamic Adaptation of Data-Driven Process Structures
Abstract. Industry is increasingly demanding IT support for large engineering processes, i.e., process structures consisting of hundreds up to thousands of processes. Developing a ...
Dominic Müller, Manfred Reichert, Joachim Her...
CIKM
2008
Springer
15 years 2 months ago
Indexing and retrieval of a Greek corpus
Greek is one of the most difficult languages to handle in Web Information Retrieval (IR) related tasks. Its difficulty stems from the fact that it is grammatically, morphologicall...
Georgios Paltoglou, Michail Salampasis, Fotis Laza...
108
Voted
DSOM
2008
Springer
15 years 2 months ago
SYMIAN: A Simulation Tool for the Optimization of the IT Incident Management Process
Incident Management is the process through which IT support organizations manage to restore normal service operation after a service disruption. The complexity of IT support organi...
Claudio Bartolini, Cesare Stefanelli, Mauro Torton...
ECOOP
2008
Springer
15 years 2 months ago
Computing Stack Maps with Interfaces
Abstract. Lightweight bytecode verification uses stack maps to annotate Java bytecode programs with type information in order to reduce the verification to type checking. This pape...
Frédéric Besson, Thomas P. Jensen, T...