Sciweavers

3119 search results - page 524 / 624
» General Default Logic
Sort
View
DBSEC
2008
136views Database» more  DBSEC 2008»
15 years 2 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
107
Voted
LREC
2010
187views Education» more  LREC 2010»
15 years 2 months ago
Analysing Temporally Annotated Corpora with CAVaT
We present CAVaT, a tool that performs Corpus Analysis and Validation for TimeML. CAVaT is an open source, modular checking utility for statistical analysis of features specific t...
Leon Derczynski, Robert J. Gaizauskas
FMOODS
2007
15 years 2 months ago
Formal Modeling and Analysis of the OGDC Wireless Sensor Network Algorithm in Real-Time Maude
This paper describes the application of Real-Time Maude to the formal specification, simulation, and further formal analysis of the sophisticated state-of-the-art OGDC wireless se...
Peter Csaba Ölveczky, Stian Thorvaldsen
IWEC
2007
15 years 2 months ago
Cultural Computing and the Self Concept: Towards Unconscious Metamorphosis
Abstract. We are exploring an application for a novel direction in humancomputer interaction named ‘cultural computing’, which aims to provide a new medium for cultural transla...
Tijn Kooijmans, Matthias Rauterberg
SERP
2007
15 years 2 months ago
Software Engineering Design Patterns for Relational Databases
– The use of design patterns such as the GRASP (General Responsibility Assignment Software Principles) or GoF (Gang-of-Four) patterns in software engineering has been well-docume...
Cyril S. Ku, Thomas J. Marlowe, Tatyana Budanskaya...