Fractional permissions use fractions to distinguish write access (1) from read access (any smaller fraction). Nesting (an extension of adoption) can be used to model object invari...
We present a data-driven approach to learn user-adaptive referring expression generation (REG) policies for spoken dialogue systems. Referring expressions can be difficult to unde...
Software architecture evaluation has been proposed as a means to achieve quality attributes such as maintainability and reliability in a system. The objective of the evaluation is...
: This paper contains description of an knowledge discovery experiment performed in radio planning department of one of Polish celular telecom providers. The results of using vario...
In market-driven product development large numbers of requirements threaten to overload the development organization. It is critical for product management to select the requireme...