Sciweavers

10241 search results - page 1765 / 2049
» Goal-Driven Software Development
Sort
View
140
Voted
WCRE
2005
IEEE
15 years 9 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
136
Voted
WECWIS
2005
IEEE
141views ECommerce» more  WECWIS 2005»
15 years 9 months ago
An Adaptive Bilateral Negotiation Model for E-Commerce Settings
This paper studies adaptive bilateral negotiation between software agents in e-commerce environments. Specifically, we assume that the agents are self-interested, the environment...
Vidya Narayanan, Nicholas R. Jennings
146
Voted
ACMACE
2005
ACM
15 years 9 months ago
The CaveUT system: immersive entertainment based on a game engine
We describe the development of the CaveUT system, which is a software supporting immersive virtual reality installations based on the Unreal Tournament game engine. CaveUT impleme...
Jeffrey Jacobson, Marc Le Renard, Jean-Luc Lugrin,...
118
Voted
ITICSE
2005
ACM
15 years 9 months ago
From objects-first to design-first with multimedia and intelligent tutoring
“Objects-first” is an increasingly popular strategy for teaching object-oriented programming by introducing the concepts of objects, classes, and instances before procedural e...
Sally H. Moritz, Fang Wei, Shahida M. Parvez, Glen...
145
Voted
JCDL
2005
ACM
175views Education» more  JCDL 2005»
15 years 9 months ago
Automated text classification using a multi-agent framework
Automatic text classification is an important operational problem in digital library practice. Most text classification efforts so far concentrated on developing centralized solut...
Yueyu Fu, Weimao Ke, Javed Mostafa
« Prev « First page 1765 / 2049 Last » Next »