Sciweavers

1548 search results - page 200 / 310
» Computational Approaches to Sentence Completion
Sort
View
HICSS
2003
IEEE
198views Biometrics» more  HICSS 2003»
14 years 2 months ago
Allocating Time and Resources in Project Management Under Uncertainty
We define and develop a solution approach for planning, scheduling and managing project efforts where there is significant uncertainty in the duration, resource requirements and o...
Mark A. Turnquist, Linda K. Nozick
SCAM
2003
IEEE
14 years 2 months ago
The Java System Dependence Graph
The Program Dependence Graph was introduced by Ottenstein and Ottenstein in 1984. It was suggested to be a suitable internal program representation for monolithic programs, for th...
Neil Walkinshaw, Marc Roper, Murray Wood
ATAL
2006
Springer
14 years 18 days ago
Balancing the needs of players and spectators in agent-based commentary systems
We describe an agent-based commentary system for computer games which produces real-time and post-game commentary for spectators. Our system adopts an embodied approach in which r...
Dan Fielding, Brian Logan, Steve Benford
ATVA
2008
Springer
99views Hardware» more  ATVA 2008»
13 years 11 months ago
Model Checking Recursive Programs with Exact Predicate Abstraction
e Abstraction Arie Gurfinkel1 , Ou Wei2 , and Marsha Chechik2 1 Software Engineering Institute, Carnegie Mellon University 2 Department of Computer Science, University of Toronto A...
Arie Gurfinkel, Ou Wei, Marsha Chechik
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
13 years 11 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...