Sciweavers

935 search results - page 124 / 187
» From Logic Programming Towards Multi-Agent Systems
Sort
View
TEC
2002
166views more  TEC 2002»
13 years 9 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
ICSE
1995
IEEE-ACM
14 years 1 months ago
Architectural Mismatch or Why It's Hard to Build Systems Out Of Existing Parts
Many would argue that future breakthroughs in software productivity will dependon our ability to combine existing pieces of software to produce new applications. An important step...
David Garlan, Robert Allen, John Ockerbloom
SIGMOD
2005
ACM
177views Database» more  SIGMOD 2005»
14 years 9 months ago
An approach for pipelining nested collections in scientific workflows
We describe an approach for pipelining nested data collections in scientific workflows. Our approach logically delimits arbitrarily nested collections of data tokens using special...
Timothy M. McPhillips, Shawn Bowers
HICSS
2009
IEEE
118views Biometrics» more  HICSS 2009»
14 years 4 months ago
FXplorer: Exploration of Computed Software Behavior - A New Approach to Understanding and Verification
The craft of software understanding and verification can benefit from technologies that enable evolution toward a true engineering discipline. In current practice, software develo...
Luanne Burns, Timothy Daly
ILP
2004
Springer
14 years 3 months ago
Learning Ensembles of First-Order Clauses for Recall-Precision Curves: A Case Study in Biomedical Information Extraction
Many domains in the field of Inductive Logic Programming (ILP) involve highly unbalanced data. Our research has focused on Information Extraction (IE), a task that typically invol...
Mark Goadrich, Louis Oliphant, Jude W. Shavlik