Sciweavers

2763 search results - page 69 / 553
» The Dangerous 'All' in Specifications
Sort
View
AUSDM
2006
Springer
82views Data Mining» more  AUSDM 2006»
14 years 28 days ago
Generality Is Predictive of Prediction Accuracy
During knowledge acquisition multiple alternative potential rules all appear equally credible. This paper addresses the dearth of formal analysis about how to select between such a...
Geoffrey I. Webb, Damien Brain
FASE
2000
Springer
14 years 24 days ago
Parallel Refinement Mechanisms for Real-Time Systems
This paper discusses highly general mechanisms for specifying the refinement of a real-time system as a collection of lower level parallel components that preserve the timing and f...
Paul Z. Kolano, Richard A. Kemmerer, Dino Mandriol...
APN
2006
Springer
13 years 11 months ago
Invariant Based Programming
Program verification is usually done by adding specifications and invariants to the program and then proving that the verification conditions are all true. This makes program verif...
Ralph-Johan Back
AVI
2006
13 years 10 months ago
Task taxonomy for graph visualization
Our goal is to define a list of tasks for graph visualization that has enough detail and specificity to be useful to designers who want to improve their system and to evaluators w...
Bongshin Lee, Catherine Plaisant, Cynthia Sims Par...
WSC
1998
13 years 10 months ago
The DoD High Level Architecture: an update
The High Level Architecture (HLA) provides the specification of a common technical architecture for use across all classes of simulations in the US Department of Defense. It provi...
Judith S. Dahmann, Richard Fujimoto, Richard M. We...