Sciweavers

1625 search results - page 195 / 325
» Intentionality
Sort
View
MDM
2007
Springer
148views Communications» more  MDM 2007»
14 years 4 months ago
Enforcing Data Integrity in Very Large Ad Hoc Networks
Ad hoc networks rely on nodes forwarding each other’s packets, making trust and cooperation key issues for ensuring network performance. As long as all nodes in the network belo...
Daniela Gavidia, Maarten van Steen
OOPSLA
2007
Springer
14 years 4 months ago
Combining structural subtyping and external dispatch
Nominal subtyping (or user-defined subtyping) and structural subtyping each have their own strengths and weaknesses. Nominal subtyping allows programmers to explicitly express de...
Donna Malayeri
VAMOS
2007
Springer
14 years 4 months ago
Exploring the Dimensions of Variability: a Requirements Engineering Perspective
Goal models have been found to be effective for representing and analyzing variability at the early requirements level, by comprehensibly representing all alternative ways by whic...
Sotirios Liaskos, Lei Jiang, Alexei Lapouchnian, Y...
WER
2007
Springer
14 years 4 months ago
Evolving Use Case Maps as a Scenario and Workflow Description Language
Since 1996, the core Use Case Map (UCM) notation has remained remarkably stable. As the structure and intent of workflow and scenario languages are very similar, UCMs have been ap...
Gunter Mussbacher
WINE
2007
Springer
142views Economy» more  WINE 2007»
14 years 4 months ago
Sponsored Search with Contexts
We examine a formal model of sponsored search in which advertisers can bid not only on search terms, but on search terms under specific contexts. A context is any auxiliary infor...
Eyal Even-Dar, Michael J. Kearns, Jennifer Wortman