Sciweavers

307 search results - page 15 / 62
» Exception Handling: An Architecture Model and Utility Suppor...
Sort
View
ACL
1993
13 years 9 months ago
The Effect of Establishing Coherence in Ellipsis and Anaphora Resolution
This paper presents a new model of anaphoric processing that utilizes the establishment of coherence relations between clauses in a discourse. We survey data that comprises a curr...
Andrew Kehler
ICFP
2007
ACM
14 years 7 months ago
Adding delimited and composable control to a production programming environment
Operators for delimiting control and for capturing composable continuations litter the landscape of theoretical programming language research. Numerous papers explain their advant...
Matthew Flatt, Gang Yu, Robert Bruce Findler, Matt...
VMCAI
2005
Springer
14 years 1 months ago
Information Flow Analysis for Java Bytecode
Abstract. We present a context-sensitive compositional analysis of information flow for full (mono-threaded) Java bytecode. Our idea consists in transforming the Java bytecode int...
Samir Genaim, Fausto Spoto
ATAL
2004
Springer
14 years 29 days ago
Demonstrating Social Error Recovery with AgentFactory
In real world applications, agents - be they software agents or autonomous robots - inevitably face erroneous situations that have not been planned for. Re-planning can sometimes ...
Robert J. Ross, Rem W. Collier, Gregory M. P. O'Ha...
HICSS
2009
IEEE
128views Biometrics» more  HICSS 2009»
13 years 11 months ago
Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models
To facilitate rational decision making regarding cyber security investments, decision makers need to be able to assess expected losses before and after potential investments. This...
Teodor Sommestad, Mathias Ekstedt, Pontus Johnson