Over the years, our group, led by Bob Balzer, designed and implemented three domain-specific languages for use by outside people in real situations. The first language described t...
: I will discuss two efforts to get Intrusion Detection Systems to work together - the Common Intrusion Detection Framework (CIDF), and the IETF's working group to develop an ...
This special issue describes a number of applications that utilize lifelike characters that teach indirectly, by playing some role in a social interaction with a user. The design ...
Populating the Cyc Knowledge Base (KB) has been a manual process until very recently. However, there is currently enough knowledge in Cyc for it to be feasible to attempt to acqui...
Purvesh Shah, David Schneider, Cynthia Matuszek, R...
Although eXtreme Programming has been explained by Kent Beck[1], there are many benefits to adopting eXtreme Programming (XP) practices in other development processes. The benefit...