Sciweavers

4372 search results - page 863 / 875
» Data Semantics Revisited
Sort
View
NAACL
1994
13 years 9 months ago
Session 10: Government Panel
The Workshop included an extended group of presentations by selected US government agencies and an invited guest from the European Community. These presentations, amplified in the...
Oscar N. Garcia
EACL
1989
ACL Anthology
13 years 8 months ago
A rich environment for experimentation with unification grammars
This paper describes some of the features of a sophisticated language and environment designed for experimentation with unification-oriented linguistic descriptions. The system, w...
Rod L. Johnson, Mike Rosner
LFP
1992
140views more  LFP 1992»
13 years 8 months ago
Global Tagging Optimization by Type Inference
Tag handling accounts for a substantial amount of execution cost in latently typed languages such as Common LISP and Scheme, especially on architectures that provide no special ha...
Fritz Henglein
BPSC
2009
184views Business» more  BPSC 2009»
13 years 8 months ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen
CONEXT
2009
ACM
13 years 8 months ago
Virtually eliminating router bugs
Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semant...
Eric Keller, Minlan Yu, Matthew Caesar, Jennifer R...