Sciweavers

1675 search results - page 313 / 335
» Some thoughts on teaching programming and programming langua...
Sort
View
JUCS
2008
117views more  JUCS 2008»
13 years 7 months ago
Eliminating Cycles in Weak Tables
: Weak References constitute an elegant mechanism for an application to interact with its garbage collector. In most of its typical uses, weak references are used through weak tabl...
Alexandra Barros, Roberto Ierusalimschy
JCP
2007
86views more  JCP 2007»
13 years 7 months ago
Taking Multiple-Choise Quiz by SMS on Mobile Phones Including Analyzing Property
— Recently Mobile Learning (M-Learning) has attracted much attention. Due to advantages of SMS (Short Messaging Service) on mobile phones we present a safe and protected method f...
Mohammad Shirali-Shahreza
JOT
2007
169views more  JOT 2007»
13 years 7 months ago
Translating AUML Diagrams into Maude Specifications: A Formal Verification of Agents Interaction Protocols
Agents Interaction Protocols (AIPs) play a crucial role in multi-agents systems development. They allow specifying sequences of messages between agents. Major proposed protocols s...
Farid Mokhati, Noura Boudiaf, Mourad Badri, Linda ...
CORR
2002
Springer
106views Education» more  CORR 2002»
13 years 7 months ago
Domain-Dependent Knowledge in Answer Set Planning
In this paper we consider three di erent kinds of domain dependent control knowledge (temporal, procedural and HTN-based) that are useful in planning. Our approach is declarative ...
Tran Cao Son, Chitta Baral, Tran Hoai Nam, Sheila ...
JOOP
1998
86views more  JOOP 1998»
13 years 7 months ago
Prelude to a Theory of Void
A set of rules to ascertain that in calls of the form x.f (...) there will always be an object attached to x. 1 PURPOSE The theory developed in this article investigates void call...
Bertrand Meyer