Sciweavers

1551 search results - page 50 / 311
» How Typical is the
Sort
View
ACL
1989
15 years 5 months ago
Two Constraints on Speech Act Ambiguity
Existing plan-based theories of speech act interpretation do not account for the conventional aspect of speech acts. We use patterns of linguistic features (e.g. mood, verb form, ...
Elizabeth A. Hinkelman, James F. Allen
PERVASIVE
2004
Springer
15 years 9 months ago
Issues with RFID Usage in Ubiquitous Computing Applications
Radio Frequency Identification (RFID) has recently received a lot of attention as an augmentation technology in the ubiquitous computing domain. In this paper we present various s...
Christian Floerkemeier, Matthias Lampe
CAISE
2003
Springer
15 years 9 months ago
An Adaptive Document Version Management Scheme
This paper addresses the design and implementation of an adaptive document version management scheme. Existing schemes typically assume: (i) a priori expectations for how versions ...
Boualem Benatallah, Mehregan Mahdavi, Phuong Nguye...
CP
1998
Springer
15 years 8 months ago
Consistency Techniques in Ordinary Differential Equations
Abstract. This paper takes a fresh look at the application of interval analysis to ordinary differential equations and studies how consistency techniques can help address the accur...
Yves Deville, Micha Janssen, Pascal Van Hentenryck
EGCDMAS
2004
147views ECommerce» more  EGCDMAS 2004»
15 years 5 months ago
Should We Prove Security Policies Correct?
Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the s...
Sebastiano Battiato, Giampaolo Bella, Salvatore Ri...