Sciweavers

2162 search results - page 43 / 433
» E-Crime Investigative Technologies
Sort
View
DAC
2012
ACM
11 years 11 months ago
Assessing the performance limits of parallelized near-threshold computing
Supply voltage scaling has stagnated in recent technology nodes, leading to so-called “dark silicon.” In this paper, we investigate the limit of voltage scaling together with ...
Nathaniel Ross Pinckney, Korey Sewell, Ronald G. D...
JCAL
2002
105views more  JCAL 2002»
13 years 8 months ago
Conceptualising work activity for CAL systems design
As computing technology has increasingly become relevant to people's everyday lives, emphasis is being placed on ensuring Computer Assisted Learning (CAL) tools support users ...
D. Mwanza
IFIP12
2010
13 years 7 months ago
Rule Learning with Negation: Issues Regarding Effectiveness
: An investigation of rule learning processes that allow the inclusion of negated features is described. The objective is to establish whether the use of negation in inductive rule...
Stephanie Chua, Frans Coenen, Grant Malcolm
RULEML
2010
Springer
13 years 7 months ago
Norm Compliance in Business Process Modeling
We investigate the concept of norm compliance in business process modeling. In particular we propose an extension of Formal Contract Logic (FCL), a combination of defeasible logic ...
Guido Governatori, Antonino Rotolo
RULEML
2010
Springer
13 years 7 months ago
Superiority Based Revision of Defeasible Theories
We propose a systematic investigation on how to modify a preference relation in a defeasible logic theory to change the conclusions of the theory itself. We argue that the approach...
Guido Governatori, Francesco Olivieri, Simone Scan...