Sciweavers

5451 search results - page 944 / 1091
» Typed Operational Semantics
Sort
View
145
Voted
INFOSCALE
2007
ACM
15 years 5 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
110
Voted
AAAI
2010
15 years 5 months ago
Finding Optimal Solutions to Cooperative Pathfinding Problems
In cooperative pathfinding problems, non-interfering paths that bring each agent from its current state to its goal state must be planned for multiple agents. We present the first...
Trevor Scott Standley
125
Voted
APCCM
2007
15 years 5 months ago
A Framework for Managing the Evolution of Business Protocols in Web Services
Web services are loosely coupled software components that are published, discovered, and invoked across the Web. As the use of Web services grows, in order to correctly interact w...
Seung Hwan Ryu, Régis Saint-Paul, Boualem B...
124
Voted
BCSHCI
2008
15 years 5 months ago
Low cost prototyping: part 1, or how to produce better ideas faster by getting user reactions early and often
Although approaches to User Centered Software Development have existed for almost 20 years a rift still exists between theory and practice. In practice, many software projects are...
Stephen Brown, Andreas Holzinger
127
Voted
LREC
2008
193views Education» more  LREC 2008»
15 years 5 months ago
Automated Subject Induction from Query Keywords through Wikipedia Categories and Subject Headings
This paper addresses a novel approach that integrates two different types of information resources: the World Wide Web and libraries. This approach is based on a hypothesis: advan...
Yoji Kiyota, Noriyuki Tamura, Satoshi Sakai, Hiros...