Sciweavers

186 search results - page 34 / 38
» Learning about Constraints by Reflection
Sort
View
EUROPAR
2003
Springer
14 years 1 months ago
Support for Personal and Service Mobility in Ubiquitous Computing Environments
This paper describes an agent-based architecture that extends personal mobility to ubiquitous environment. A software agent, running on a portable device, leverages the existing se...
Khalil El-Khatib, N. Hadibi, Gregor von Bochmann
ICSE
1999
IEEE-ACM
14 years 4 days ago
Exploiting ADLs to Specify Architectural Styles Induced by Middleware Infrastructures
Architecture Definition Languages (ADLs) enable the formalization of the architecture of software systems and the execution of preliminary analyses on them. These analyses aim at...
Elisabetta Di Nitto, David S. Rosenblum
KDD
1999
ACM
185views Data Mining» more  KDD 1999»
14 years 4 days ago
User-Driven Navigation Pattern Discovery from Internet Data
Managers of electronic commerce sites need to learn as much as possible about their customers and those browsing their virtual premises, in order to maximise the return on marketin...
Matthias Baumgarten, Alex G. Büchner, Sarabjo...
ACL
2009
13 years 5 months ago
Jointly Identifying Temporal Relations with Markov Logic
Recent work on temporal relation identification has focused on three types of relations between events: temporal relations between an event and a time expression, between a pair o...
Katsumasa Yoshikawa, Sebastian Riedel, Masayuki As...
ICITS
2009
13 years 5 months ago
Survey: Leakage Resilience and the Bounded Retrieval Model
Abstract. This survey paper studies recent advances in the field of LeakageResilient Cryptography. This booming area is concerned with the design of cryptographic primitives resist...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs