Sciweavers

1606 search results - page 291 / 322
» Methodological Approach for Developing a KMS: A Case Study
Sort
View
PPDP
2004
Springer
14 years 27 days ago
Nominal rewriting systems
We present a generalisation of first-order rewriting which allows us to deal with terms involving binding operations in an elegant and practical way. We use a nominal approach to...
Maribel Fernández, Murdoch Gabbay, Ian Mack...
SELMAS
2004
Springer
14 years 27 days ago
Aspectizing Multi-agent Systems: From Architecture to Implementation
Agent architectures have to cope with a number of internal properties (concerns), such as autonomy, learning, and mobility. As the agent complexity increases, these agent propertie...
Alessandro F. Garcia, Uirá Kulesza, Carlos ...
CCS
2003
ACM
14 years 23 days ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang
ICSE
2010
IEEE-ACM
14 years 10 days ago
A search engine for finding highly relevant applications
A fundamental problem of finding applications that are highly relevant to development tasks is the mismatch between the high-level intent reflected in the descriptions of these ...
Mark Grechanik, Chen Fu, Qing Xie, Collin McMillan...
PEPM
2009
ACM
14 years 3 days ago
Clone detection and removal for Erlang/OTP within a refactoring environment
A well-known bad code smell in refactoring and software maintenance is duplicated code, or code clones. A code clone is a code fragment that is identical or similar to another. Un...
Huiqing Li, Simon Thompson