In this paper we demonstrate several examples of solving challenging algorithmic problems from the Google Code Jam programming contest with the Prolog-based ECLi PSe system using ...
An important dimension of complex networks is embedded in the weights of its edges. Incorporating this source of information on the analysis of a network can greatly enhance our u...
Sarvenaz Choobdar, Pedro Manuel Pinto Ribeiro, Fer...
The performance of value classes is highly dependent on how they are represented in the virtual machine. Value class instances are immutable, have no identity, and can only refer ...
Tobias Pape, Carl Friedrich Bolz, Robert Hirschfel...
Given the trend towards mobile computing, the next generation of ubiquitous “smart” services will have to continuously analyze surrounding sensor data. More than ever, such se...
Peer-to-peer (P2P) communication plays an ever-expanding role in critical applications with rapidly growing user bases. In addition to well-known P2P systems for data sharing (e.g...
Organizations often outsource software testing activities to optimize software testing and verify developed software by independent experts. Related benefits include expectations ...
Abstract. The notion of module extraction has been studied extensively in the ontology community. The idea is to extract, from a large ontology, those axioms that are relevant to c...
Situational awareness applications used in disaster response and tactical scenarios require efficient communication without support from a fixed infrastructure. As commercial off...
Samuel Wood, James Mathewson, Joshua Joy, Mark-Oli...