Sciweavers

1466 search results - page 112 / 294
» Completeness of the Authentication Tests
Sort
View
TOOLS
2000
IEEE
13 years 11 months ago
Applying the Lessons of eXtreme Programming
Although eXtreme Programming has been explained by Kent Beck[1], there are many benefits to adopting eXtreme Programming (XP) practices in other development processes. The benefit...
Pete McBreen
IJCAI
2007
13 years 9 months ago
Semantic Precision and Recall for Ontology Alignment Evaluation
In order to evaluate ontology matching algorithms it is necessary to confront them with test ontologies and to compare the results with some reference. The most prominent comparis...
Jérôme Euzenat
ACL
1997
13 years 9 months ago
Combining Unsupervised Lexical Knowledge Methods for Word Sense Disambiguation
This paper presents a method to combine a set of unsupervised algorithms that can accurately disambiguate word senses in a large, completely untagged corpus. Although most of the ...
German Rigau, Jordi Atserias, Eneko Agirre
ENTCS
2008
103views more  ENTCS 2008»
13 years 8 months ago
Systematic Semantic Tableaux for PLTL
The better known methods of semantic tableaux for deciding satisfiability in propositional linear temporal logic generate graphs in addition to classical trees. The test of satisf...
Joxe Gaintzarain, Montserrat Hermo, Paqui Lucio, M...
IJON
2006
165views more  IJON 2006»
13 years 8 months ago
Design and basic blocks of a neuromorphic VLSI analogue vision system
: In this paper we present a complete neuromorphic image processing system and we report the development of an integrated CMOS low-power circuit to test the feasibility of its diff...
Jordi Cosp, Jordi Madrenas, Daniel Fernánde...