Sciweavers

2015 search results - page 39 / 403
» Hidden Software Capabilities
Sort
View
IUI
2004
ACM
14 years 2 months ago
Computer algebra in interface design research
Tools to design, analyse and evaluate user interfaces can be used in user interface design research and in interface modelling research. This demonstration shows two working syste...
Harold W. Thimbleby, Jeremy Gow
KBSE
2000
IEEE
14 years 1 months ago
Circular Coinductive Rewriting
Circular coinductive rewriting is a new method for proving behavioral properties, that combines behavioral rewriting with circular coinduction. This method is implemented in our n...
Joseph A. Goguen, Kai Lin, Grigore Rosu
EUROMICRO
1997
IEEE
14 years 1 months ago
What computer architecture can learn from computational intelligence-and vice versa
This paper considers whether the seemingly disparate fields of Computational Intelligence (CI) and computer architecture can profit from each others’ principles, results and e...
Ronald Moore, Bernd Klauer, Klaus Waldschmidt
TAPSOFT
1989
Springer
14 years 16 days ago
Independence of Negative Constraints
In the 1820's Fourier provided the first algorithm for solving linear arithmetic constraints. In other words, this algorithm determines whether or not the polyhedral set asso...
Jean-Louis Lassez, Ken McAloon
MIDDLEWARE
2009
Springer
14 years 3 months ago
Why Do Upgrades Fail and What Can We Do about It?
Abstract. Enterprise-system upgrades are unreliable and often produce downtime or data-loss. Errors in the upgrade procedure, such as broken dependencies, constitute the leading ca...
Tudor Dumitras, Priya Narasimhan