Sciweavers

250 search results - page 17 / 50
» A Study of Applying Knowledge Modelling to Evidence-Based Gu...
Sort
View
MSR
2010
ACM
15 years 3 months ago
Identifying security bug reports via text mining: An industrial case study
-- A bug-tracking system such as Bugzilla contains bug reports (BRs) collected from various sources such as development teams, testing teams, and end users. When bug reporters subm...
Michael Gegick, Pete Rotella, Tao Xie
WSC
2000
15 years 3 months ago
Interactive Web-based animations for teaching and learning
Web-based study resources can be viewed as a basic requirement in order to remain a competitive player on a more and more globalised educational market. For that reason it is gett...
Michael Syrjakow, Jörg Berdux, Helena Szczerb...
SAC
2009
ACM
15 years 6 months ago
Self-organized control of knowledge generation in pervasive computing systems
Pervasive computing devices (e.g., sensor networks, localization devices, cameras, etc.) are increasingly present in every aspect of our lives. These devices are able to generate ...
Gabriella Castelli, Ronaldo Menezes, Franco Zambon...
ICDE
2012
IEEE
203views Database» more  ICDE 2012»
13 years 4 months ago
Parameter-Free Determination of Distance Thresholds for Metric Distance Constraints
—The importance of introducing distance constraints to data dependencies, such as differential dependencies (DDs) [28], has recently been recognized. The metric distance constrai...
Shaoxu Song, Lei Chen 0002, Hong Cheng
DIS
2001
Springer
15 years 6 months ago
Computational Discovery of Communicable Knowledge: Symposium Report
Abstract. The Symposium on Computational Discovery of Communicable Knowledge was held from March 24 to 25, 2001, at Stanford University. Fifteen speakers reviewed recent advances i...
Saso Dzeroski, Pat Langley