Sciweavers

6016 search results - page 1109 / 1204
» The semantics of graphical languages
Sort
View
SAC
2004
ACM
14 years 3 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
CAISE
2004
Springer
14 years 3 months ago
Information Modeling and Higher-order Types
: While some information modeling approaches (e.g. the Relational Model, and Object-Role Modeling) are typically formalized using first-order logic, other approaches to information...
Terry A. Halpin
CLEF
2004
Springer
14 years 3 months ago
How to Visually Retrieve Images from the St. Andrews Collection Using GIFT
Abstract. The ImageCLEF task of CLEF has a main goal in the retrieval of images from multi–lingual collections. The 2003 imageCLEF saw no group using the visual information of im...
Henning Müller, Antoine Geissbühler
CP
2004
Springer
14 years 3 months ago
Leveraging the Learning Power of Examples in Automated Constraint Acquisition
Constraint programming is rapidly becoming the technology of choice for modeling and solving complex combinatorial problems. However, users of constraint programming technology nee...
Christian Bessière, Remi Coletta, Eugene C....
IFIP
2004
Springer
14 years 3 months ago
Static program transformations for efficient software model checking
Ensuring correctness of software by formal methods is a very relevant and widely studied problem. Automatic verification of software using model checkers from the state space exp...
Shobha Vasudevan, Jacob A. Abraham
« Prev « First page 1109 / 1204 Last » Next »