Sciweavers

416 search results - page 48 / 84
» Enough of Processes - Lets do Practices
Sort
View
ENTCS
2006
123views more  ENTCS 2006»
14 years 9 months ago
Steering of Discrete Event Systems: Control Theory Approach
Runtime verification involves monitoring the system at runtime to check for conformance of the execution trace to user defined safety properties. Typically, run-time verifiers do ...
Arvind Easwaran, Sampath Kannan, Oleg Sokolsky
ESWA
2006
99views more  ESWA 2006»
14 years 9 months ago
Assessing a knowledge-based approach to commercial loan underwriting
We discuss the challenges in developing decision support tools for commercial underwriting and describe how several different approaches to the underwriting problem have been addr...
Roger Kumra, Roger M. Stein, Ian Assersohn
JOT
2008
96views more  JOT 2008»
14 years 9 months ago
Agile Software Product Lines, Deconstructed
There was much interest at this year's Software Product Line Conference in how to combine agile and product line techniques. Agile teams seek to address change one product at...
John McGregor
PVLDB
2008
138views more  PVLDB 2008»
14 years 9 months ago
Authenticating the query results of text search engines
The number of successful attacks on the Internet shows that it is very difficult to guarantee the security of online search engines. A breached server that is not detected in time...
HweeHwa Pang, Kyriakos Mouratidis
71
Voted
ACL
2010
14 years 7 months ago
Modeling Norms of Turn-Taking in Multi-Party Conversation
Substantial research effort has been invested in recent decades into the computational study and automatic processing of multi-party conversation. While most aspects of conversati...
Kornel Laskowski