Sciweavers

531 search results - page 64 / 107
» The information environments program - a new design based IT...
Sort
View
OOPSLA
2007
Springer
14 years 3 months ago
Modular typestate checking of aliased objects
Objects often define usage protocols that clients must follow in order for these objects to work properly. Aliasing makes it notoriously difficult to check whether clients and i...
Kevin Bierhoff, Jonathan Aldrich
EEE
2005
IEEE
14 years 2 months ago
From Multi-Context Business Collaboration Models to Context-Specific ebXML BPSS
UN/CEFACT’s Modelling Methodology (UMM) is used to analyze and design B2B business processes. We extend UMM by a constraint mechanism for adding business environment-specific co...
Birgit Hofreiter, Christian Huemer
EICS
2010
ACM
14 years 2 months ago
Letras: an architecture and framework for ubiquitous pen-and-paper interaction
Paper remains a prevalent medium in mobile usage contexts due to its inherent flexibility and robustness. Mobile computing solutions begin to provide powerful and convenient func...
Felix Heinrichs, Jürgen Steimle, Daniel Schre...
IEEEIAS
2008
IEEE
14 years 3 months ago
Operator-Centric and Adaptive Intrusion Detection
: An intrusion detection system should support the operator of the system. Thus, in addition to producing alerts, it should allow for easy insertion of new detection algorithms. It...
Ulf Larson, Stefan Lindskog, Dennis K. Nilsson, Er...
AIEDAM
1999
79views more  AIEDAM 1999»
13 years 8 months ago
An algorithmic approach to knowledge evolution
Intelligent agents must update their knowledge base as they acquire new information about their environment. The modal logic S5n has been designed for representing knowledge bases...
Alessio Lomuscio, Mark Ryan