Sciweavers

1512 search results - page 232 / 303
» When Suboptimal Rules
Sort
View
EDOC
2002
IEEE
15 years 4 months ago
Discretionary Enforcement of Electronic Contracts
As in traditional commerce, parties to a contract in ebusiness environments are expected to operate in good faith and comply with mutually agreed terms of contract. It may be the ...
Zoran Milosevic, Audun Jøsang, Theodosis Di...
ICTAI
2002
IEEE
15 years 4 months ago
Machine Learning for Software Engineering: Case Studies in Software Reuse
There are many machine learning algorithms currently available. In the 21st century, the problem no longer lies in writing the learner, but in choosing which learners to run on a ...
Justin S. Di Stefano, Tim Menzies
WMCSA
2002
IEEE
15 years 4 months ago
Extensible Adaptation via Constraint Solving
Applications running on a mobile and wireless devices must be able to adapt gracefully to limited and fluctuating network resources. The variety of applications, platforms upon w...
Yuri Dotsenko, Eyal de Lara, Dan S. Wallach, Willy...
EDBT
2009
ACM
135views Database» more  EDBT 2009»
15 years 3 months ago
Provenance for nested subqueries
Data provenance is essential in applications such as scientific computing, curated databases, and data warehouses. Several systems have been developed that provide provenance fun...
Boris Glavic, Gustavo Alonso
IFL
2001
Springer
142views Formal Methods» more  IFL 2001»
15 years 3 months ago
A Compilation Scheme for a Hierarchy of Array Types
In order to achieve a high level of abstraction, array-oriented languages provide language constructs for defining array operations in a shape-invariant way. However, when trying ...
Dietmar Kreye