Sciweavers

171 search results - page 8 / 35
» What's Decidable about Sequences
Sort
View
ACSD
1998
IEEE
113views Hardware» more  ACSD 1998»
13 years 11 months ago
Modeling and Analyzing Interorganizational Workflows
Today's corporations often must operate across organizational boundaries. Phenomena such as electronic commerce, extended enterprises, and the Internet stimulate cooperation ...
Wil M. P. van der Aalst
RTA
2007
Springer
14 years 1 months ago
Intruders with Caps
In the analysis of cryptographic protocols, a treacherous set of terms is one from which an intruder can get access to what was intended to be secret, by adding on to the top of a ...
Siva Anantharaman, Paliath Narendran, Michaël...
FLAIRS
2008
13 years 9 months ago
Learning a Probabilistic Model of Event Sequences from Internet Weblog Stories
One of the central problems in building broad-coverage story understanding systems is generating expectations about event sequences, i.e. predicting what happens next given some a...
Mehdi Manshadi, Reid Swanson, Andrew S. Gordon
ICSM
2009
IEEE
14 years 2 months ago
Searching and skimming: An exploratory study
Source code search is an important activity for programmers working on a change task to a software system. As part of a larger project to improve tool support for finding informa...
Jamie Starke, Chris Luce, Jonathan Sillito
CIA
2006
Springer
13 years 11 months ago
A Simple Argumentation Based Contract Enforcement Mechanism
Abstract. Agents may choose to ignore contract violations if the costs of enforcing the contract exceed the compensation they would receive. In this paper we provide an argumentati...
Nir Oren, Alun D. Preece, Timothy J. Norman