Sciweavers

940 search results - page 98 / 188
» Rules and Strategies in Java
Sort
View
ICSM
2000
IEEE
15 years 5 months ago
A Deployment System for Pervasive Computing
Software has for a long time been used for controlling different systems. Today, there is a trend towards integrating software into consumer electronics, home appliances, cars etc...
Jesper Andersson
82
Voted
CASCON
2006
118views Education» more  CASCON 2006»
15 years 2 months ago
Ensuring behavioural equivalence in test-driven porting
In this paper we present a test-driven approach to porting code from one object-oriented language to another. We derive an order for the porting of the code, along with a testing ...
Mark Hennessy, James F. Power
91
Voted
DAGSTUHL
2007
15 years 2 months ago
Parallel universes to improve the diagnosis of cardiac arrhythmias
arrhythmias (extended abstract) Elisa Fromont, Ren´e Quiniou, Marie-Odile Cordier We are interested in using parallel universes to learn interpretable models that can be subseque...
Élisa Fromont, Rene Quiniou, Marie-Odile Co...
100
Voted
RTA
1995
Springer
15 years 4 months ago
Prototyping Completion with Constraints Using Computational Systems
We use computational systems to express a completion with constraints procedure that gives priority to simplifications. Computational systems are rewrite theories enriched by stra...
Hélène Kirchner, Pierre-Etienne More...
111
Voted
WWW
2008
ACM
16 years 1 months ago
Improving web spam detection with re-extracted features
Web spam detection has become one of the top challenges for the Internet search industry. Instead of using some heuristic rules, we propose a feature re-extraction strategy to opt...
Guanggang Geng, Chunheng Wang, Qiudan Li