Sciweavers

1342 search results - page 231 / 269
» Ordered Programs as Abductive Systems
Sort
View
ICDT
2001
ACM
110views Database» more  ICDT 2001»
14 years 1 months ago
On Answering Queries in the Presence of Limited Access Patterns
In information-integration systems, source relations often have limitations on access patterns to their data; i.e., when one must provide values for certain attributes of a relatio...
Chen Li, Edward Y. Chang
SIGSOFT
2000
ACM
14 years 1 months ago
Automated systematic testing for constraint-based interactive services
Constraint-based languages can express in a concise way the complex logic of a new generation of interactive services for applications such as banking or stock trading, that must ...
Patrice Godefroid, Lalita Jategaonkar Jagadeesan, ...
IEAAIE
1999
Springer
14 years 29 days ago
Modelling Fuzzy Sets Using Object-Oriented Techniques
This paper describes a new approach to model fuzzy sets using object-oriented programming techniques. Currently, the most frequently used method to model fuzzy sets is by using a p...
Gary Yat Chung Wong, Hon Wai Chun
IEAAIE
1998
Springer
14 years 27 days ago
Managing the Usage Experience in a Library of Software Components
The users of libraries of object-oriented software components face with both a terminological and a cognitive gap. Usually, library users do not understand the vocabulary used in t...
Pedro A. González-Calero, Mercedes Gó...
HICSS
1996
IEEE
123views Biometrics» more  HICSS 1996»
14 years 26 days ago
Concurrency: A Case Study in Remote Tasking and Distributed IPC
Remote tasking encompasses different functionality, such as remote forking, multiple remote spawning, and task migration. In order to overcome the relatively high costs of these m...
Dejan S. Milojicic, Alan Langerman, David L. Black...