Sciweavers

122 search results - page 24 / 25
» Design snippets: partial design representations extracted fr...
Sort
View
MSR
2005
ACM
13 years 11 months ago
Improving evolvability through refactoring
Refactoring is one means of improving the structure of existing software. Locations for the application of refactoring are often based on subjective perceptions such as ”bad sme...
Jacek Ratzinger, Michael Fischer, Harald Gall
MM
2010
ACM
207views Multimedia» more  MM 2010»
13 years 5 months ago
TalkMiner: a search engine for online lecture video
TalkMiner is a search engine for lecture webcasts. Lecture videos are processed to recover a set of distinct slide images and OCR is used to generate a list of indexable terms fro...
John Adcock, Matthew Cooper, Laurent Denoue, Hamed...
CHI
2007
ACM
14 years 6 months ago
FASTDash: a visual dashboard for fostering awareness in software teams
Software developers spend significant time gaining and maintaining awareness of fellow developers' activities. FASTDash is a new interactive visualization that seeks to impro...
Jacob T. Biehl, Mary Czerwinski, Greg Smith, Georg...
CCO
2001
Springer
161views Combinatorics» more  CCO 2001»
13 years 10 months ago
Branch, Cut, and Price: Sequential and Parallel
Branch, cut, and price (BCP) is an LP-based branch and bound technique for solving large-scale discrete optimization problems (DOPs). In BCP, both cuts and variables can be generat...
Laszlo Ladányi, Ted K. Ralphs, Leslie E. Tr...
ACSAC
2008
IEEE
14 years 4 days ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh