Sciweavers

647 search results - page 26 / 130
» Technical method of Zoetmorerope
Sort
View
TOPLAS
2010
93views more  TOPLAS 2010»
13 years 6 months ago
Semantics of fractional permissions with nesting
Fractional permissions use fractions to distinguish write access (1) from read access (any smaller fraction). Nesting (an extension of adoption) can be used to model object invari...
John Tang Boyland
ACL
2010
13 years 5 months ago
Learning to Adapt to Unknown Users: Referring Expression Generation in Spoken Dialogue Systems
We present a data-driven approach to learn user-adaptive referring expression generation (REG) policies for spoken dialogue systems. Referring expressions can be difficult to unde...
Srinivasan Janarthanam, Oliver Lemon
ASWEC
2004
IEEE
13 years 11 months ago
A Framework for Classifying and Comparing Software Architecture Evaluation Methods
Software architecture evaluation has been proposed as a means to achieve quality attributes such as maintainability and reliability in a system. The objective of the evaluation is...
Muhammad Ali Babar, Liming Zhu, D. Ross Jeffery
IIS
2000
13 years 9 months ago
Applying Data Mining Methods for Cellular Radio Network Planning
: This paper contains description of an knowledge discovery experiment performed in radio planning department of one of Polish celular telecom providers. The results of using vario...
Piotr Gawrysiak, Michal Okoniewski
APSEC
2007
IEEE
13 years 11 months ago
A Method for Early Requirements Triage and Selection Utilizing Product Strategies
In market-driven product development large numbers of requirements threaten to overload the development organization. It is critical for product management to select the requireme...
Mahvish Khurum, Khurum Aslam, Tony Gorschek