Sciweavers

302 search results - page 21 / 61
» Playing with Rules
Sort
View
TARK
2007
Springer
14 years 1 months ago
Explaining quantity implicatures
We give derivations of two formal models of Gricean Quantity1 implicature and strong exhaustivity (Van Rooij and Schulz, 2004; Schulz and Van Rooij, 2006), in bidirectional optima...
Tikitu de Jager, Robert van Rooij
IWDC
2004
Springer
120views Communications» more  IWDC 2004»
14 years 1 months ago
SCIDS: A Soft Computing Intrusion Detection System
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. Th...
Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong...
BCSHCI
2008
13 years 9 months ago
Walk 2 Win: towards designing a mobile game for elderly's social engagement
In this paper we describe a user-centered approach to designing and evaluating a socially interactive mobile game for the elderly. The objective of the game is to encourage the el...
Omar Mubin, Suleman Shahid, Abdullah Al Mahmud
SAC
2009
ACM
14 years 2 months ago
Where are your manners?: Sharing best community practices in the web 2.0
The Web 2.0 fosters the creation of communities by offering users a wide array of social software tools. While the success of these tools is based on their ability to support diff...
Angelo Di Iorio, Davide Rossi, Fabio Vitali, Stefa...
ICDE
1991
IEEE
175views Database» more  ICDE 1991»
13 years 11 months ago
Constraint-Based Reasoning in Deductive Databases
— Constraints play an important role in the efficient query evaluation in deductive databases. In this paper, constraint-based query evaluation in deductive databases is investi...
Jiawei Han