Sciweavers

231 search results - page 33 / 47
» Evolving machine microprograms
Sort
View
TEC
2008
127views more  TEC 2008»
13 years 7 months ago
Fingerprinting: Visualization and Automatic Analysis of Prisoner's Dilemma Strategies
Fingerprinting is a technique for generating a representation-independent functional signature for a game playing agent. Fingerprints can be used to compare agents across represent...
Daniel A. Ashlock, Eun-Youn Kim
SIGSOFT
2007
ACM
14 years 8 months ago
Recovering and using use-case-diagram-to-source-code traceability links
Use case diagrams (UCDs) are widely used to describe requirements and desired functionality of software products. However, UCDs are loosely linked to source code, and maintaining ...
Mark Grechanik, Kathryn S. McKinley, Dewayne E. Pe...
LCR
2000
Springer
148views System Software» more  LCR 2000»
13 years 11 months ago
InterWeave: A Middleware System for Distributed Shared State
Abstract. As an alternative to message passing, Rochester's InterWeave system allows the programmer to map shared segments into programs spread across heterogeneous, distribut...
DeQing Chen, Sandhya Dwarkadas, Srinivasan Parthas...
BPM
2008
Springer
161views Business» more  BPM 2008»
13 years 9 months ago
BESERIAL: Behavioural Service Interface Analyser
In a service-oriented architecture, software services interact by means of message exchanges that follow certain patterns documented in the form of behavioural interfaces. As any s...
Ali Aït-Bachir, Marlon Dumas, Marie-Christine...
ICIP
2005
IEEE
14 years 9 months ago
Using visual features for anti-spam filtering
Unsolicited Commercial Email (UCE), also known as spam, has been a major problem on the Internet. In the past, researchers have addressed this problem as a text classification or ...
Ching-Tung Wu, Kwang-Ting Cheng, Qiang Zhu, Yi-Leh...