Sciweavers

1072 search results - page 189 / 215
» Semantic Evaluation for Spoken-Language Systems
Sort
View
ASE
2008
120views more  ASE 2008»
14 years 9 months ago
Requirements model generation to support requirements elicitation: the Secure Tropos experience
In the last years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during req...
Nadzeya Kiyavitskaya, Nicola Zannone
COMPUTING
2006
100views more  COMPUTING 2006»
14 years 9 months ago
Interval Arithmetic with Containment Sets
The idea of containment sets (csets) is due to Walster and Hansen, and the theory is mainly due to the first author. Now that floating point computation with infinities is widely a...
John D. Pryce, George F. Corliss
CORR
2006
Springer
135views Education» more  CORR 2006»
14 years 9 months ago
Constraint Functional Logic Programming over Finite Domains
In this paper, we present our proposal to Constraint Functional Logic Programming over Finite Domains (CFLP(FD) ) with a lazy functional logic programming language which seamlessl...
Antonio J. Fernández, Maria Teresa Hortal&a...
KAIS
2006
95views more  KAIS 2006»
14 years 9 months ago
Discovering mappings in hierarchical data from multiple sources using the inherent structure
Unprecedented amounts of media data are publicly accessible. However, it is increasingly difficult to integrate relevant media from multiple and diverse sources for effective appli...
K. Selçuk Candan, Jong Wook Kim, Huan Liu, ...
101
Voted
IMCS
2007
78views more  IMCS 2007»
14 years 9 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri