Sciweavers

478 search results - page 73 / 96
» Computational thinking
Sort
View
SP
1989
IEEE
160views Security Privacy» more  SP 1989»
14 years 1 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash
ATAL
2006
Springer
14 years 1 months ago
Monotonic concession protocols for multilateral negotiation
The most natural way of thinking about negotiation is probably a situation whereby each of the parties involved initially make a proposal that is particularly beneficial to themse...
Ulle Endriss
DAGSTUHL
2007
13 years 11 months ago
End-User Software Engineering Position Paper
bstract, rather than through examples. I’d like to see the ability to demonstrate examples in concrete situations, have the system record them, and generalize them to yield a pro...
Henry Lieberman
DAGSTUHL
2007
13 years 11 months ago
Discovering Knowledge from Local Patterns with Global Constraints
It is well known that local patterns are at the core of a lot of knowledge which may be discovered from data. Nevertheless, use of local patterns is limited by their huge number an...
Bruno Crémilleux, Arnaud Soulet
CRIWG
2004
13 years 11 months ago
CreEx: A Framework for Creativity in Cooperative Problem Solving
Abstract. Creativity has become an important factor in recent years, as companies need to be able to quickly adapt to take advantage of new opportunities and handle fast paced chan...
Adriana Santarosa Vivacqua, Jano Moreira de Souza