Sciweavers

4126 search results - page 630 / 826
» Set based logic programming
Sort
View
113
Voted
WORDS
2003
IEEE
15 years 8 months ago
Security and Middleware
The security features of current middleware platforms, like Enterprise Java Beans and CORBA, are either simple and limited or complex and difficult to use. In both cases are the ...
Anders Andersen, Gordon S. Blair, Per Harald Myrva...
UIST
2003
ACM
15 years 8 months ago
A molecular architecture for creating advanced GUIs
This paper presents a new GUI architecture for creating advanced interfaces. This model is based on a limited set of general principles that improve flexibility and provide capabi...
Eric Lecolinet
AMKM
2003
Springer
15 years 8 months ago
Automatically Generated DAML Markup for Semistructured Documents
The semantic web is becoming a realizable technology due to the efforts of researchers to develop semantic markup languages such as the DARPA Agent Markup Language (DAML). A major...
William Krueger, Jonathan Nilsson, Tim Oates, Timo...
ICSM
1997
IEEE
15 years 7 months ago
Identifying modules via concept analysis
ÐWe describe a general technique for identifying modules in legacy code. The method is based on concept analysisÐa branch of lattice theory that can be used to identify similarit...
Michael Siff, Thomas W. Reps
AISC
2006
Springer
15 years 6 months ago
Finding Relations Among Linear Constraints
In program analysis and verification, there are some constraints that have to be processed repeatedly. A possible way to speed up the processing is to find some relations among the...
Jun Yan, Jian Zhang, Zhongxing Xu