Sciweavers

3555 search results - page 171 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
TPLP
2002
99views more  TPLP 2002»
15 years 3 months ago
Using Methods of Declarative Logic Programming for Intelligent Information Agents
At present, the search for specific information on the World Wide Web is faced with several problems, which arise on the one hand from the vast number of information sources avail...
Thomas Eiter, Michael Fink, Giuliana Sabbatini, Ha...
ICECCS
2006
IEEE
90views Hardware» more  ICECCS 2006»
15 years 10 months ago
A Type System for the Relational Calculus of Object Systems
Being a successful technique in software practice, Object Orientation (OO) is a hot topic in academic research fields. Among many formalisms, rCOS, a refinement calculus of obje...
Liang Zhao, Xiangpeng Zhao, Quan Long, Zongyan Qiu
MUC
1991
15 years 7 months ago
University of Massachusetts: description of the CIRCUS system as used for MUC-3
ind this work was to extract a relatively abstract level of information from each sentence , using only a limited vocabulary that was hand-crafted to handle a restricted set of tar...
Wendy G. Lehnert, Claire Cardie, David Fisher, Ell...
ESEC
1997
Springer
15 years 8 months ago
Verification of Liveness Properties Using Compositional Reachability Analysis
The software architecture of a distributed program can be represented by a hierarchical composition of subsystems, with interacting processes at the leaves of the hierarchy. Compo...
Shing-Chi Cheung, Dimitra Giannakopoulou, Jeff Kra...
TSMC
2008
167views more  TSMC 2008»
15 years 3 months ago
A Human-Computer Interface Using Symmetry Between Eyes to Detect Gaze Direction
In the cases of paralysis so severe that a person's ability to control movement is limited to the muscles around the eyes, eye movements or blinks are the only way for the per...
John J. Magee, Margrit Betke, James Gips, M. R. Sc...