Sciweavers

181 search results - page 17 / 37
» Knowledge Provenance
Sort
View
ACSAC
1999
IEEE
14 years 22 days ago
Using Abuse Case Models for Security Requirements Analysis
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge o...
John P. McDermott, Chris Fox
RTA
2010
Springer
14 years 9 days ago
Simulation in the Call-by-Need Lambda-Calculus with letrec
This paper shows the equivalence of applicative similarity and contextual approximation, and hence also of bisimilarity and contextual equivalence, in the deterministic call-by-nee...
Manfred Schmidt-Schauß, David Sabel, Elena M...
AAAI
2008
13 years 10 months ago
Simulation-Based Approach to General Game Playing
The aim of General Game Playing (GGP) is to create intelligent agents that automatically learn how to play many different games at an expert level without any human intervention. ...
Hilmar Finnsson, Yngvi Björnsson
ESWS
2008
Springer
13 years 10 months ago
Mymory: Enhancing a Semantic Wiki with Context Annotations
Abstract. For document-centric work, meta-information in form of annotations has proven useful to enhance search and other retrieval tasks. The Mymory project1 uses a web-based wor...
Malte Kiesel, Sven Schwarz, Ludger van Elst, Georg...
MC
2008
126views Computer Science» more  MC 2008»
13 years 9 months ago
Identifying User Interface Patterns from Pertinent Multimodal Interaction Use Cases
The context of this work is usability engineering for multimodal interaction. In contrast to other work centrates on prototyping toolkits or abstract guidelines, this research foc...
Andreas Ratzka