Sciweavers

229 search results - page 27 / 46
» A Case for Priority
Sort
View
SUM
2010
Springer
13 years 8 months ago
Handling Inconsistency with Preference-Based Argumentation
Abstract. Argumentation is a promising approach for handling inconsistent knowledge bases, based on the justification of plausible conclusions by arguments. Due to inconsistency, ...
Leila Amgoud, Srdjan Vesic
ICAIL
2003
ACM
14 years 3 months ago
Developing Legal Knowledge Based Systems Through Theory Construction
Bench-Capon and Sartor have proposed that reasoning with legal cases be seen as a process of theory construction, evaluation and application. They have proposed a set of theory co...
Alison Chorley, Trevor J. M. Bench-Capon
TC
1998
13 years 9 months ago
Algorithms for Variable Length Subnet Address Assignment
In a computer network that consists of M subnetworks, the L-bit address of a machine consists of two parts: A pre x si that contains the address of the subnetwork to which the mac...
Mikhail J. Atallah, Douglas Comer
RE
2002
Springer
13 years 9 months ago
Extreme Programming Modified: Embrace Requirements Engineering Practices
Extreme Programming (XP) is an agile (lightweight) software development methodology and it becomes more and more popular. XP proposes many interesting practices, but it also has s...
Jerzy R. Nawrocki, Michal Jasiñski, Bartosz...
ESSOS
2009
Springer
14 years 4 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely