Sciweavers

606 search results - page 89 / 122
» words 2002
Sort
View
DKE
2002
119views more  DKE 2002»
13 years 9 months ago
Enabling the creation of knowledge about software assets
In most companies two factors play a crucial role: managing the knowledge that is necessary for doing business and managing the hardware and software infrastructure that supports ...
Paul Klint, Chris Verhoef
DM
2002
95views more  DM 2002»
13 years 9 months ago
On the superconnectivity of generalized p-cycles
A generalized p-cycle is a digraph whose set of vertices can be partitioned into p parts that are cyclically ordered in such a way that the vertices in one part are adjacent only ...
Camino Balbuena, Ignacio M. Pelayo, J. Góme...
ENTCS
2002
131views more  ENTCS 2002»
13 years 9 months ago
Automatic Generation of Language-based Tools
Many tools have been constructed using different formal methods to process various parts of a language specification (e.g., scanner generators, parser generators and compiler gene...
Pedro Rangel Henriques, Maria João Varanda ...
ENTCS
2002
61views more  ENTCS 2002»
13 years 9 months ago
Effectively Absolute Continuity and Effective Jordan Decomposability
Classically, any absolute continuous real function is of bounded variation and hence can always be expressed as a difference of two increasing continuous functions (socalled Jorda...
Xizhong Zheng, Robert Rettinger, Burchard von Brau...
COMPSEC
2002
185views more  COMPSEC 2002»
13 years 9 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz