Sciweavers

1523 search results - page 231 / 305
» Detecting and Sketching the Common
Sort
View
IJCAI
2003
14 years 11 months ago
Expressive Power of Tree and String Based Wrappers
There exist two types of wrappers: the string based wrapper such as the LR wrapper, and the tree based wrapper. A tree based wrapper designates extraction regions by nodes on the ...
Daisuke Ikeda, Yasuhiro Yamada, Sachio Hirokawa
AAAI
1998
14 years 11 months ago
Analyzing External Conditions to Improve the Efficiency of HTN Planning
One difficulty with existing theoretical work on HTN planning is that it does not address some of the planning constructs that are commonly used in HTN planners for practical appl...
Reiko Tsuneto, James A. Hendler, Dana S. Nau
PROCOMET
1998
14 years 11 months ago
Extended static checking
Software development and maintenance are costly endeavors. The cost can be reduced if more software defects are detected earlier in the development cycle. This paper introduces th...
K. Rustan M. Leino
CLEF
2010
Springer
14 years 11 months ago
Wiki Vandalysis - Wikipedia Vandalism Analysis - Lab Report for PAN at CLEF 2010
Wikipedia describes itself as the "free encyclopedia that anyone can edit". Along with the helpful volunteers who contribute by improving the articles, a great number of ...
Manoj Harpalani, Thanadit Phumprao, Megha Bassi, M...
ECMDAFA
2008
Springer
118views Hardware» more  ECMDAFA 2008»
14 years 11 months ago
A Metamodeling Approach for Reasoning about Requirements
In requirements engineering, there are several approaches for requirements modeling such as goal-oriented, aspect-driven, and system requirements modeling. In practice, companies o...
Arda Goknil, Ivan Kurtev, Klaas van den Berg