Sciweavers

315 search results - page 33 / 63
» Using Logic in the Generation of Referring Expressions
Sort
View
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
15 years 6 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
SIGSOFT
2010
ACM
14 years 11 months ago
Representation dependence testing using program inversion
The definition of a data structure may permit many different concrete representations of the same logical content. A (client) program that accepts such a data structure as input i...
Aditya Kanade, Rajeev Alur, Sriram K. Rajamani, Ga...
DLOG
2007
15 years 4 months ago
A New Mapping from ALCI to ALC
Abstract. This paper studies a technique for mapping ALCI knowledge bases into ALC. Worst-case optimal tableau-based procedures for the satisfiability/consistency problem w.r.t. g...
Yu Ding, Volker Haarslev, Jiewen Wu
BMCBI
2008
179views more  BMCBI 2008»
15 years 2 months ago
Building pathway clusters from Random Forests classification using class votes
Background: Recent years have seen the development of various pathway-based methods for the analysis of microarray gene expression data. These approaches have the potential to bri...
Herbert Pang, Hongyu Zhao
SPIN
2010
Springer
15 years 8 days ago
Enacting Declarative Languages Using LTL: Avoiding Errors and Improving Performance
In our earlier work we have proposed using the declarative language DecSerFlow for modeling, analysis and enactment of processes in autonomous web services. DecSerFlow uses constra...
Maja Pesic, Dragan Bosnacki, Wil M. P. van der Aal...