Sciweavers

3555 search results - page 77 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
WOTUG
2007
15 years 2 months ago
Integrating and Extending JCSP
This paper presents the extended and re-integrated JCSP library of CSP packages for Java. It integrates the differing advances made by Quickstone’s JCSP Network Edition and the â...
Peter H. Welch, Neil Brown, James Moores, Kevin Ch...
ICCBR
2007
Springer
15 years 7 months ago
A Case-Based Framework for Collaborative Semantic Search in Knowledge Sifter
This paper addresses the role of case-based reasoning in semantic search, and in particular, as it applies to Knowledge Sifter, an agent-based ontology-driven search system based o...
Larry Kerschberg, Hanjo Jeong, Yong Uk Song, Wooju...
CHI
2005
ACM
16 years 1 months ago
Polymorphic letters: transforming pen movements to extend written expression
We are developing a digital writing tool, Polymorphic Letters (PL), to investigate hand and pen movements as they may extend and enrich expression in written language. PL recogniz...
Andrea Taylor, Zoltan Foley-Fisher, Carol Stroheck...
WSC
2001
15 years 2 months ago
Case study in modeling and simulation validation methodology
The military develops simulations to analyze nearly every aspect of defense. How accurate are these simulations and to what extent do they produce dependable results? Most guidanc...
Scott D. Simpkins, Eugene P. Paulo, Lyn R. Whitake...
IMECS
2007
15 years 2 months ago
On Extendable Software Architecture for Spam Email Filtering
—The research community and the IT industry have invested significant effort in fighting spam emails. There are many different approaches, ranging from white listing, black listi...
Wanli Ma, Dat Tran, Dharmendra Sharma