Sciweavers

2272 search results - page 273 / 455
» Validity Invariants and Effects
Sort
View
110
Voted
ISMIS
2000
Springer
15 years 4 months ago
An Intelligent Lessons Learned Process
A learned lesson, in the context of a pre-defined organizational process, summarizes an experience that should be used to modify that process, under the conditions for which that l...
Rosina Weber, David W. Aha, Héctor Mu&ntild...
111
Voted
CSREASAM
2006
15 years 2 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
115
Voted
WSC
2000
15 years 2 months ago
Analyzing transformation-based simulation metamodels
We present a technique for analyzing a simulation metamodel that has been constructed using a variancestabilizing transformation. To compute a valid confidence interval for the ex...
Maria de los A. Irizarry, Michael E. Kuhl, Emily K...
130
Voted
WSC
1997
15 years 2 months ago
MODSIM III - A Tutorial
This tutorial introduces the MODSIM III language, showing how its simulation "world view" together with its object-oriented architecture and built in graphics contribute...
John Goble
107
Voted
CIDR
2009
119views Algorithms» more  CIDR 2009»
15 years 1 months ago
DBMSs Should Talk Back Too
Natural language user interfaces to database systems have been studied for several decades now. They have mainly focused on parsing and interpreting natural language queries to ge...
Alkis Simitsis, Yannis E. Ioannidis