Sciweavers

759 search results - page 45 / 152
» What Can Be Implemented Anonymously
Sort
View
BIRTHDAY
2010
Springer
13 years 10 months ago
Programming Inductive Proofs - A New Approach Based on Contextual Types
In this paper, we present an overview to programming with proofs in the reasoning framework, Beluga. Beluga supports the specification of formal systems given by axioms and inferen...
Brigitte Pientka
WCRE
2007
IEEE
14 years 4 months ago
Visualizing Software Architecture Evolution Using Change-Sets
When trying to understand the evolution of a software system it can be useful to visualize the evolution of the system’s architecture. Existing tools for viewing architectural e...
Andrew McNair, Daniel M. Germán, Jens H. We...
IVA
2001
Springer
14 years 2 months ago
Autonomous Avatars? From Users to Agents and Back
We describe the architecture of an interactive, “believable” agent with personality, called user agent, which can act on behalf of a user in various multi-user game contexts, w...
Matthias Scheutz, Brigitte Römmer
COMPSAC
1998
IEEE
14 years 2 months ago
Software Engineering for Scalable Distributed Applications
A major problem in the development of distributed applications is that we cannot assume that the environment in which the application is to operate will remain the same. This mean...
Maarten van Steen, Stefan Van der Zijden, Henk J. ...
BXML
2004
13 years 11 months ago
Trust and context using the RDF-Source related Storage System (RDF-S3) and easy RQL (eRQL)
Abstract. There exist different ways how to understand and use context information for RDF data. This paper summarizes these different ways and concentrates on the source informati...
Karsten Tolle, Fabian Wleklinski