Sciweavers

42 search results - page 8 / 9
» Documenting Typical Crosscutting Concerns
Sort
View
CHI
2007
ACM
14 years 5 months ago
Exploring patterns of social commonality among file directories at work
We studied files stored by members of a work organization for patterns of social commonality. Discovering identical or similar documents, applications, developer libraries, or oth...
John C. Tang, Clemens Drews, Mark Smith, Fei Wu, A...
DILS
2004
Springer
13 years 10 months ago
PROVA: Rule-Based Java-Scripting for a Bioinformatics Semantic Web
Abstract. Transparent information integration across distributed and heterogeneous data sources and computational tools is a prime concern for bioinformatics. Recently, there have ...
Alexander Kozlenkov, Michael Schroeder
CAV
2011
Springer
253views Hardware» more  CAV 2011»
12 years 9 months ago
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection
Abstract. Many automatic testing, analysis, and verification techniques for programs can effectively be reduced to a constraint-generation phase followed by a constraint-solving ...
Vijay Ganesh, Adam Kiezun, Shay Artzi, Philip J. G...
GECCO
2005
Springer
186views Optimization» more  GECCO 2005»
13 years 11 months ago
Subproblem optimization by gene correlation with singular value decomposition
Several ways of using singular value decomposition (SVD), a linear algebra technique typically used for information retrieval, to decompose problems into subproblems are investiga...
Jacob G. Martin
WCRE
1995
IEEE
13 years 9 months ago
Pattern Matching for Design Concept Localization
A legacy system is an operational, large-scale software system that is maintained beyond its first generation of programmers. It typically represents a massive economic investmen...
Kostas Kontogiannis, Renato de Mori, Morris Bernst...