Sciweavers

42738 search results - page 8457 / 8548
» Search Computing Systems
Sort
View
128
Voted
AGTIVE
2003
Springer
15 years 6 months ago
Specifying Pointer Structures by Graph Reduction
Graph-reduction specifications (GRSs) are a powerful new method for specifying classes of pointer data structures (shapes). They cover important shapes, like various forms of bal...
Adam Bakewell, Detlef Plump, Colin Runciman
97
Voted
ATAL
2003
Springer
15 years 6 months ago
Optimal agendas for multi-issue negotiation
There are two ways of handling bilateral multi-issue negotiations – one is to negotiate all the issues together, and the other is to negotiate them one by one. The order in whic...
S. Shaheen Fatima, Michael Wooldridge, Nicholas R....
93
Voted
ATAL
2003
Springer
15 years 6 months ago
Customizing AOSE methodologies by reusing AOSE features
Future large-scale software development projects will require engineering support for a diverse range of software quality attributes, such as privacy and openness. It is not feasi...
Thomas Juan, Leon Sterling, Maurizio Martelli, Viv...
ATAL
2003
Springer
15 years 6 months ago
Natural methods for robot task learning: instructive demonstrations, generalization and practice
Among humans, teaching various tasks is a complex process which relies on multiple means for interaction and learning, both on the part of the teacher and of the learner. Used tog...
Monica N. Nicolescu, Maja J. Mataric
98
Voted
CCS
2003
ACM
15 years 6 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
« Prev « First page 8457 / 8548 Last » Next »