Sciweavers

713 search results - page 137 / 143
» Syntax and Semantics of Babel-17
Sort
View
SIGCSE
1990
ACM
126views Education» more  SIGCSE 1990»
14 years 13 days ago
A philosophy and example of CS-1 programming projects
This paper presents a philosophy underlying CS-1 programming projects, and illustrates this philosophy with a concrete example. Integral to the philosophy is the use of Ada packag...
Richard E. Pattis
AIED
2007
Springer
14 years 13 days ago
Evaluating a Collaborative Constraint-based Tutor for UML Class Diagrams
COLLECT-UML is a collaborative constraint-based tutor for teaching object-oriented analysis and design using Unified Modelling Language. It is the first system in the family of con...
Nilufar Baghaei, Antonija Mitrovic
EDBT
2009
ACM
170views Database» more  EDBT 2009»
14 years 9 days ago
Efficient constraint evaluation in categorical sequential pattern mining for trajectory databases
The classic Generalized Sequential Patterns (GSP) algorithm returns all frequent sequences present in a database. However, usually a few ones are interesting from a user's po...
Leticia I. Gómez, Alejandro A. Vaisman
ICLP
2007
Springer
14 years 8 days ago
Web Sites Verification: An Abductive Logic Programming Tool
We present the CIFFWEB system, an innovative tool for the verification of web sites, relying upon abductive logic programming. The system allows the user to define rules that a web...
Paolo Mancarella, Giacomo Terreni, Francesca Toni
CCS
2006
ACM
14 years 4 days ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang