Sciweavers

1106 search results - page 174 / 222
» Software That Can Think and Do
Sort
View
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
14 years 1 months ago
Legitimate by Design: Towards Trusted Virtual Community Environments
Legitimacy is a key part of the social requirements specification for a trusted virtual community environment (VCE). If an environment is not seen as legitimate, social conflicts m...
Brian Whitworth, Aldo de Moor
PAAMS
2009
Springer
14 years 1 months ago
A Tool for Generating Model Transformations By-Example in Multi-Agent Systems
Abstract Many Multi-Agent Systems (MAS) methodologies incorporate a modeldriven approach. Model Driven Engineering is based on three main ideas: models are the “first-class citi...
Iván García-Magariño, Sylvain...
SEMWEB
2001
Springer
14 years 27 days ago
Accessing Information and Services on the DAML-Enabled Web
Querying the Web today can be a frustrating activity because the results delivered by syntactically oriented search engines often do not match the intentions of the user. The DARP...
Grit Denker, Jerry R. Hobbs, David L. Martin, Srin...
ACMSE
2000
ACM
14 years 25 days ago
Exploring an information-based approach to computation and computational complexity
We present the background and justi cation for a new approachto studying computation and computational complexity. We focus on categories of problems and categories of solutions w...
D. E. Stevenson
AGP
1999
IEEE
14 years 24 days ago
ACI1 constraints
Disunification is the problem of deciding satisfiability of a system of equations and disequations with respect to a given equational theory. In this paper we study the disunifica...
Agostino Dovier, Carla Piazza, Enrico Pontelli, Gi...