Sciweavers

1045 search results - page 21 / 209
» The Use of Exceptions
Sort
View
ICSE
2004
IEEE-ACM
15 years 9 months ago
Component-Based Self-Adaptability in Peer-to-Peer Architectures
Current peer-to-peer architectures are hardly resistant against unanticipated exceptions such as the failure of single peers. This can be justified by the absence of sophisticated...
Sascha Alda
72
Voted
FLAIRS
2001
14 years 11 months ago
Skill Refinement through Competence Feedback
Learningis generally performedin twostages, knowledge acquisition and skill refinement. Developments within machinelearning havetended to concentrate on knowledgeacquisition as op...
David W. Patterson, Sarabjot S. Anand, John G. Hug...
69
Voted
ACSAC
2006
IEEE
15 years 3 months ago
A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs
In healthcare, role-based access control systems are often extended with exception mechanisms to ensure access to needed informationeven when the needs don’t followthe expected ...
Lillian Røstad, Ole Edsberg
KES
2006
Springer
14 years 9 months ago
Classification Using Multiple and Negative Target Rules
Rules are a type of human-understandable knowledge, and rule-based methods are very popular in building decision support systems. However, most current rule based classification sy...
Jiuyong Li, Jason Jones
DAGSTUHL
2008
14 years 11 months ago
Interval Arithmetic Using SSE-2
ABSTRACT. We present an implementation of double precision interval arithmetic using the single-instruction-multiple-data SSE-2 instruction and register set extensions. The impleme...
Branimir Lambov