Sciweavers

1519 search results - page 181 / 304
» What do they think
Sort
View
HPDC
2005
IEEE
14 years 4 months ago
Recording and using provenance in a protein compressibility experiment
Very large scale computations are now becoming routinely used as a methodology to undertake scientific research. In this context, ‘provenance systems’ are regarded as the equ...
Paul T. Groth, Simon Miles, Weijian Fang, Sylvia C...
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
14 years 3 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
KR
1998
Springer
14 years 3 months ago
Combining Narratives
A theory is elaboration tolerant to the extent that new information can be incorporated with only simple changes. The simplest change is conjoining new information, and only conju...
John McCarthy, Tom Costello
CHI
1997
ACM
14 years 3 months ago
Sensing Activity in Video Images
in CHI’97 Extended Abstract, ACM Press, pp. 319-320 based awareness tools and iconic indicators because it meets three crucial user requirements. This paper describes the activit...
Alison Lee, Kevin Schlueter, Andreas Girgensohn
KR
2000
Springer
14 years 2 months ago
Approximate Objects and Approximate Theories
We propose to extend the ontology of logical AI to include approximate objects, approximate predicates and approximate theories. Besides the ontology we treat the relations among ...
John McCarthy