Sciweavers

1465 search results - page 72 / 293
» Making the Correct Mistakes
Sort
View
ESSOS
2009
Springer
15 years 3 months ago
Pattern-Based Confidentiality-Preserving Refinement
Abstract. We present an approach to security requirements engineering, which makes use of special kinds of problem frames that serve to structure, characterize, analyze, and solve ...
Holger Schmidt
SIGLEX
1991
15 years 3 months ago
For the Lexicon that Has Everything
This paper argues that itisimpossible to separate lexicaland encyclopedic knowledge and describes an attempt to build a large lexical database that contains the range of informati...
Martha W. Evens, Joanne Dardaine, Yu-Feng Huang, S...
DLOG
2007
15 years 2 months ago
Automated Evaluation of Description Logic Reasoning Systems
Abstract. The DL implementation group (DIG) has specified a common interface for description logic reasoner. While the original intention was to make it easier for other tools to ...
Sebastian Wandelt
CHIMIT
2008
ACM
15 years 1 months ago
Policy-based IT automation: the role of human judgment
Policy-based automation is emerging as a viable approach to IT systems management, codifying high-level business goals into executable specifications for governing IT operations. ...
Eser Kandogan, John H. Bailey, Paul P. Maglio, Ebe...
AIPS
2006
15 years 1 months ago
A New Principle for Incremental Heuristic Search: Theoretical Results
Planning is often not a one-shot task because either the world or the agent's knowledge of the world changes. In this paper, we introduce a new principle that can be used to ...
Sven Koenig, Maxim Likhachev