Sciweavers

871 search results - page 42 / 175
» Data Recovery from Distributed Personal Repositories
Sort
View
99
Voted
SIGSOFT
2010
ACM
14 years 10 months ago
The missing links: bugs and bug-fix commits
Empirical studies of software defects rely on links between bug databases and program code repositories. This linkage is typically based on bug-fixes identified in developer-enter...
Adrian Bachmann, Christian Bird, Foyzur Rahman, Pr...
CCS
2009
ACM
16 years 1 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
IMC
2010
ACM
14 years 10 months ago
Listen to me if you can: tracking user experience of mobile network on social media
Social media sites such as Twitter continue to grow at a fast pace. People of all generations use social media to exchange messages and share experiences of their life in a timely...
Tongqing Qiu, Junlan Feng, Zihui Ge, Jia Wang, Jun...
DAGM
2011
Springer
14 years 10 days ago
Real Time Head Pose Estimation from Consumer Depth Cameras
We present a system for estimating location and orientation of a person’s head, from depth data acquired by a low quality device. Our approach is based on discriminative random r...
Gabriele Fanelli, Thibaut Weise, Juergen Gall, Luc...
103
Voted
COMSWARE
2007
IEEE
15 years 6 months ago
Integrated Data Location in Multihop Wireless Networks
Abstract— Multihop wireless networks are ideal as infrastructures for location-aware network applications, particularly for disaster recovery operations. However, one missing com...
Irfan Sheriff, Prashanth Aravinda Kumar Acharya, A...