Sciweavers

940 search results - page 64 / 188
» Rules and Strategies in Java
Sort
View
224
Voted
ECOOP
2009
Springer
16 years 4 months ago
Practical API Protocol Checking with Access Permissions
Reusable APIs often dene usage protocols. We previously developed a sound modular type system that checks compliance with typestate-based protocols while aording a great deal of al...
Kevin Bierhoff, Nels E. Beckman, Jonathan Aldrich
148
Voted
SAC
2008
ACM
15 years 2 months ago
UML-based design test generation
In this paper we investigate and propose a fully automated technique to perform conformance checking of Java implementations against UML class diagrams. In our approach, we reused...
Waldemar Pires, João Brunet, Franklin Ramal...
141
Voted
DGO
2007
150views Education» more  DGO 2007»
15 years 4 months ago
Event-triggered data and knowledge sharing among collaborating government organizations
Solving complex global problems such as illegal immigration, border control, and terrorism requires government organizations at all levels to share not only data but, more importa...
Seema Degwekar, Jeff DePree, Howard W. Beck, Carla...
ROCAI
2004
Springer
15 years 8 months ago
Learning Mixtures of Localized Rules by Maximizing the Area Under the ROC Curve
We introduce a model class for statistical learning which is based on mixtures of propositional rules. In our mixture model, the weight of a rule is not uniform over the entire ins...
Tobias Sing, Niko Beerenwinkel, Thomas Lengauer
143
Voted
IDA
2006
Springer
15 years 3 months ago
Backward chaining rule induction
Exploring the vast number of possible feature interactions in domains such as gene expression microarray data is an onerous task. We describe Backward-Chaining Rule Induction (BCR...
Douglas H. Fisher, Mary E. Edgerton, Zhihua Chen, ...