Sciweavers

2519 search results - page 385 / 504
» Reasoning with Textual Cases
Sort
View
MAS
1998
Springer
172views Communications» more  MAS 1998»
15 years 8 months ago
Protecting Mobile Agents Against Malicious Hosts
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under...
Tomas Sander, Christian F. Tschudin
IUI
1997
ACM
15 years 8 months ago
Local Plan Recognition in Direct Manipulation Interfaces
Plan recognition in direct manipulation interfaces must deal with the problem that the information obtained is of low quality with respect to the plan recognition task. There are ...
Annika Wærn
DAC
1996
ACM
15 years 8 months ago
A Sparse Image Method for BEM Capacitance Extraction
Boundary element methods (BEM) are often used for complex 3-D capacitance extraction because of their efficiency, ease of data preparation, and automatic handling of open regions. ...
Byron Krauter, Yu Xia, E. Aykut Dengi, Lawrence T....
RE
1997
Springer
15 years 8 months ago
SOFL: A Formal Engineering Methodology for Industrial Applications
—Formal methods have yet to achieve wide industrial acceptance for several reasons. They are not well integrated into hed industrial software processes, their application require...
Shaoying Liu
167
Voted
ICTAI
1993
IEEE
15 years 8 months ago
MERIT Motifs
MERIT (Multimedia Extensions of Retrieval Interaction Tools)1 provides a user-centered interface to a database covering European research programs, projects, and consortia in the ...
Ulrich Thiel, Martin Kracker, Adelheit Stein