Sciweavers

1980 search results - page 98 / 396
» On the Associative Nijenhuis Relation
Sort
View
ATAL
2009
Springer
15 years 8 months ago
Inconsistency tolerance in weighted argument systems
We introduce and investigate a natural extension of Dung’s well-known model of argument systems in which attacks are associated with a weight, indicating the relative strength o...
Paul E. Dunne, Anthony Hunter, Peter McBurney, Sim...
ECTEL
2009
Springer
15 years 8 months ago
Phantom Tasks and Invisible Rubric: The Challenges of Remixing Learning Objects in the Wild
Learning Objects are atomic packages of learning content with associated activities that can be reused in different contexts. However traditional Learning Objects can be complex an...
David E. Millard, Yvonne Margaret Howard, Patrick ...
COMPSAC
2008
IEEE
15 years 8 months ago
Mutation-Based Testing of Buffer Overflow Vulnerabilities
Buffer overflow (BOF) is one of the major vulnerabilities that leads to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying rea...
Hossain Shahriar, Mohammad Zulkernine
PG
2007
IEEE
15 years 7 months ago
Exact Evaluation of Non-Polynomial Subdivision Schemes at Rational Parameter Values
In this paper, we describe a method for exact evaluation of a limit mesh defined via subdivision on a uniform grid of any size. Other exact evaluation technique either restrict t...
Scott Schaefer, Joe D. Warren
128
Voted
ISI
2007
Springer
15 years 7 months ago
Visualization of Events in a Spatially and Multimedia Enriched Virtual Environment
—Semantic Event Tracker (SET) is a highly interactive visualization tool for tracking and associating activities (events) in a spatially and Multimedia Enriched Virtual Environme...
Leonidas Deligiannidis, Farshad Hakimpour, Amit P....