Sciweavers

359 search results - page 69 / 72
» Supporting Real World Security Models in Java
Sort
View
PFE
2001
Springer
15 years 1 months ago
Easing the Transition to Software Mass Customization
Although software mass customization offers the potential for order-of-magnitude improvements in software engineering performance, the up-front cost, level of effort, assumed risk,...
Charles W. Krueger
STOC
2010
ACM
170views Algorithms» more  STOC 2010»
15 years 1 months ago
Connectivity oracles for failure prone graphs
Dynamic graph connectivity algorithms have been studied for many years, but typically in the most general possible setting, where the graph can evolve in completely arbitrary ways...
Ran Duan, Seth Pettie
AAI
2005
166views more  AAI 2005»
14 years 9 months ago
Interactive Knowledge Construction in the Collaborative Building of an Encyclopedia
1 One of the major challenges of Applied Artificial Intelligence is to provide environments where high level human activities like learning, constructing theories or performing exp...
Philippe Lemoisson, Stefano A. Cerri
JCDL
2011
ACM
301views Education» more  JCDL 2011»
14 years 10 days ago
Archiving the web using page changes patterns: a case study
A pattern is a model or a template used to summarize and describe the behavior (or the trend) of a data having generally some recurrent events. Patterns have received a considerab...
Myriam Ben Saad, Stéphane Gançarski
OOPSLA
2007
Springer
15 years 3 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden