Sciweavers

2076 search results - page 274 / 416
» Functional logic overloading
Sort
View
COMMA
2008
15 years 4 months ago
Requirements for reflective argument visualization tools: A Case for Using Validity as a Normative Standard
This paper formulates in the first part some requirements for a certain sort of computational argumentation systems, namely those which are designed for a very specific purpose: to...
Michael H. G. Hoffmann
MKWI
2008
113views Business» more  MKWI 2008»
15 years 4 months ago
A Rule-based Middleware for Business Process Execution
Abstract. While past research in service oriented computing has focused on the fairly static functional description and the operators of services the dynamic and flexible compositi...
Adrian Paschke, Alexander Kozlenkov
139
Voted
ISSA
2004
15 years 4 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
DAIS
2009
15 years 4 months ago
Foraging for Better Deployment of Replicated Service Components
Abstract. Our work focuses on distributed software services and their requirements in terms of system performance and dependability. We target the problem of finding optimal deploy...
Máté J. Csorba, Hein Meling, Poul E....
FSKD
2008
Springer
119views Fuzzy Logic» more  FSKD 2008»
15 years 4 months ago
An Entropy Decision Model for Selection of QoS-Aware Services Provisioning
Evaluating web services provisioning is able to reduce redundancy in search and also generates advantages to service providers who deliver valuable services. However, there exist ...
Ping Wang