Sciweavers

5255 search results - page 879 / 1051
» Formal Methods for Privacy
Sort
View
SSR
2001
104views more  SSR 2001»
15 years 5 months ago
Secure and efficient mobile agent application reuse using patterns
As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal wit...
Yasuyuki Tahara, Nobukazu Toshiba, Akihiko Ohsuga,...
DLOG
2000
15 years 5 months ago
Knowledge Representation on the Web
Recently, there has been a wide interest in using ontologies on the Web. As a basis for this, RDF Schema (RDFS) provides means to define vocabulary, structure and constraints for ...
Stefan Decker, Dieter Fensel, Frank van Harmelen, ...
ACL
1997
15 years 5 months ago
Approximating Context-Free Grammars with a Finite-State Calculus
Although adequate models of human language for syntactic analysis and semantic interpretation are of at least contextfree complexity, for applications such as speech processing in...
Edmund Grimley-Evans
ESEM
2010
ACM
15 years 4 months ago
Object oriented design pattern decay: a taxonomy
Software designs decay over time. While most studies focus on decay at the system level, this research studies design decay on well understood micro architectures, design patterns...
Travis Schanz, Clemente Izurieta
CORR
2008
Springer
116views Education» more  CORR 2008»
15 years 4 months ago
An Evidential Path Logic for Multi-Relational Networks
Multi-relational networks are used extensively to structure knowledge. Perhaps the most popular instance, due to the widespread adoption of the Semantic Web, is the Resource Descr...
Marko A. Rodriguez, Joe Geldart