Sciweavers

1063 search results - page 112 / 213
» Order and Negation as Failure
Sort
View
116
Voted
ICDCS
1997
IEEE
15 years 5 months ago
Secure Reliable Multicast Protocols in a WAN
A secure reliable multicast protocol enables a process to send a message to a group of recipients such that all correct destinations receive the same message, despite the maliciou...
Dahlia Malkhi, Michael Merritt, Ohad Rodeh
ECP
1997
Springer
108views Robotics» more  ECP 1997»
15 years 5 months ago
Contingency Selection in Plan Generation
Akey question in conditional planning is: howmany, and whichof the possible executionfailures shouldbe plannedfor? Onecannot, in general, plan for all the possiblefailures because...
Nilufer Onder, Martha E. Pollack
LOPSTR
1994
Springer
15 years 4 months ago
More on Unfold/Fold Transformations of Normal Programs: Preservation of Fitting's Semantics
The unfold/fold transformation system defined by Tamaki and Sato was meant for definite programs. It transforms a program into an equivalent one in the sense of both the least tter...
Annalisa Bossi, Sandro Etalle
95
Voted
AGILEDC
2004
IEEE
15 years 4 months ago
Aligning Strategic Planning with Agile Development: Extending Agile Thinking to Business Improvement
Many development teams have successfully used Agile Development to build quality software, but often these projects have failed to effectively contribute to overall company succes...
Colin Rand, Bruce Eckfeldt
104
Voted
ICPR
2010
IEEE
15 years 4 months ago
Malware Detection on Mobile Devices Using Distributed Machine Learning
This paper presents a distributed Support Vector Machine (SVM) algorithm in order to detect malicious software (malware) on a network of mobile devices. The light-weight system mo...
Ashkan Sharifi Shamili, Christian Bauckhage, Tansu...