Sciweavers

4486 search results - page 750 / 898
» Cross-Evaluation: A new model for information system evaluat...
Sort
View
MSR
2010
ACM
15 years 1 hour ago
Identifying security bug reports via text mining: An industrial case study
-- A bug-tracking system such as Bugzilla contains bug reports (BRs) collected from various sources such as development teams, testing teams, and end users. When bug reporters subm...
Michael Gegick, Pete Rotella, Tao Xie
CHI
2010
ACM
15 years 4 months ago
Prefab: implementing advanced behaviors using pixel-based reverse engineering of interface structure
Current chasms between applications implemented with different user interface toolkits make it difficult to implement and explore potentially important interaction techniques in n...
Morgan Dixon, James Fogarty
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 4 months ago
Identity Inference as a Privacy Risk in Computer-Mediated Communication
New Web 2.0 applications, with their emphasis on collaboration and communication, hold the promise of major advances in social connectivity and coordination; however, they also in...
Sara Motahari, Sotirios G. Ziavras, Richard P. Sch...
HICSS
2005
IEEE
77views Biometrics» more  HICSS 2005»
15 years 3 months ago
Towards a Theory of Value Latency for IT Investments
Multiple studies in the information systems (IS) literature recognize that information technology (IT) investments may not yield immediate returns. Nevertheless, there has been a ...
Kim Huat Goh, Robert J. Kauffman
DAWAK
2000
Springer
15 years 2 months ago
Enhancing Preprocessing in Data-Intensive Domains using Online-Analytical Processing
Abstract The application of data mining algorithms needs a goal-oriented preprocessing of the data. In practical applications the preprocessing task is very time consuming and has ...
Alexander Maedche, Andreas Hotho, Markus Wiese