Sciweavers

1131 search results - page 188 / 227
» Logic Programming, Functional Programming, and Inductive Def...
Sort
View
91
Voted
TOOLS
2000
IEEE
15 years 4 months ago
Extending Business Objects with Business Rules
It is common to imbed business rules within the code of distributed object systems. When business practices and/or policies change, as they often do, it is difficult if not imposs...
Isabelle Rouvellou, Lou Degenaro, Kevin Rasmus, Da...
AOSD
2008
ACM
15 years 2 months ago
StrongAspectJ: flexible and safe pointcut/advice bindings
AspectJ was designed as a seamless aspect-oriented extension of the Java programming language. However, unlike Java, AspectJ does not have a safe type system: an accepted binding ...
Bruno De Fraine, Mario Südholt, Viviane Jonck...
NIPS
1998
15 years 1 months ago
Semi-Supervised Support Vector Machines
We introduce a semi-supervised support vector machine (S3 VM) method. Given a training set of labeled data and a working set of unlabeled data, S3 VM constructs a support vector m...
Kristin P. Bennett, Ayhan Demiriz
91
Voted
MTV
2007
IEEE
121views Hardware» more  MTV 2007»
15 years 6 months ago
Chico: An On-chip Hardware Checker for Pipeline Control Logic
The widening gap between CPU complexity and verification capability is becoming increasingly more salient. It is impossible to completely verify the functionality of a modern mic...
Andrew DeOrio, Adam Bauserman, Valeria Bertacco
104
Voted
CCS
2007
ACM
15 years 6 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth