Sciweavers

2043 search results - page 361 / 409
» Reasoning About Security Models
Sort
View
CSMR
1998
IEEE
14 years 2 months ago
Towards Mature Measurement Programs
Many organizations are using measurement as a means to improve their software development and maintenance processes. A reasonable consensus has been reached about the main success...
Frank Niessink, Hans van Vliet
AMET
1998
Springer
14 years 2 months ago
Bidding Strategies for Trading Agents in Auction-Based Tournaments
Abstract. Auction-based electronic commerce is an increasingly interesting domain for AI researchers. In this paper we present an attempt towards the construction of trading agents...
Pere Garcia, Eduardo Giménez, Lluis Godo, J...
SIGMOD
1998
ACM
180views Database» more  SIGMOD 1998»
14 years 2 months ago
Integration of Heterogeneous Databases Without Common Domains Using Queries Based on Textual Similarity
Most databases contain “name constants” like course numbers, personal names, and place names that correspond to entities in the real world. Previous work in integration of het...
William W. Cohen
CONCUR
1997
Springer
14 years 2 months ago
Modularity for Timed and Hybrid Systems
Abstract. In a trace-based world, the modular speci cation, veri cation, and control of live systems require each module to be receptive that is, each module must be able to meet i...
Rajeev Alur, Thomas A. Henzinger
EWHCI
1993
14 years 2 months ago
The MSM Framework: A Design Space for Multi-Sensori-Motor Systems
One of the new design goals in Human Computer Interaction is to extend the sensory-motor capabilities of computer systems to better match the natural communication means of human b...
Joëlle Coutaz, Laurence Nigay, Daniel Salber