Sciweavers

1586 search results - page 285 / 318
» Modeling the evolution of operating systems: An empirical st...
Sort
View
SAC
2005
ACM
15 years 3 months ago
Discovery and regeneration of hidden emails
The popularity of email has triggered researchers to look for ways to help users better organize the enormous amount of information stored in their email folders. One challenge th...
Giuseppe Carenini, Raymond T. Ng, Xiaodong Zhou, E...
77
Voted
LREC
2010
213views Education» more  LREC 2010»
14 years 11 months ago
Extensive Evaluation of a FrameNet-WordNet mapping resource
Lexical resources are basic components of many text processing system devoted to information extraction, question answering or dialogue. In paste years many resources have been de...
Diego De Cao, Danilo Croce, Roberto Basili
85
Voted
JUCS
2008
113views more  JUCS 2008»
14 years 9 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
87
Voted
ATAL
1997
Springer
15 years 1 months ago
A Formal Specification of dMARS
The Procedural Reasoning System (PRS) is the best established agent architecture currently available. It has been deployed in many major industrial applications, ranging from fault...
Mark d'Inverno, David Kinny, Michael Luck, Michael...
178
Voted
ICDT
2009
ACM
248views Database» more  ICDT 2009»
15 years 10 months ago
Automatic verification of data-centric business processes
We formalize and study business process systems that are centered around "business artifacts", or simply "artifacts". This approach focuses on data records, kn...
Alin Deutsch, Richard Hull, Fabio Patrizi, Victor ...