Sciweavers

750 search results - page 102 / 150
» Desires, Norms and Constraints
Sort
View
ICSE
2008
IEEE-ACM
16 years 19 days ago
Systematically refactoring inheritance to delegation in java
Because of the strong coupling of classes and the proliferation of unneeded class members induced by inheritance, the suggestion to use composition and delegation instead has beco...
Hannes Kegel, Friedrich Steimann
SIGSOFT
2005
ACM
16 years 17 days ago
Relational analysis of algebraic datatypes
We present a technique that enables the use of finite model finding to check the satisfiability of certain formulas whose intended models are infinite. Such formulas arise when us...
Viktor Kuncak, Daniel Jackson
WWW
2001
ACM
16 years 15 days ago
Spoken Query for Web Search and Navigation
Mobile devices will become an important platform for Internet access. Due to size constraints, in many circumstances speech is the most desirable mode of input. We have developed ...
Huixiang Gu, Jianming Li, Ben Walter, Eric Chang
KDD
2004
ACM
158views Data Mining» more  KDD 2004»
16 years 7 days ago
A generalized maximum entropy approach to bregman co-clustering and matrix approximation
Co-clustering is a powerful data mining technique with varied applications such as text clustering, microarray analysis and recommender systems. Recently, an informationtheoretic ...
Arindam Banerjee, Inderjit S. Dhillon, Joydeep Gho...
HPCA
2004
IEEE
16 years 6 days ago
Exploring Wakeup-Free Instruction Scheduling
Design of wakeup-free issue queues is becoming desirable due to the increasing complexity associated with broadcast-based instruction wakeup. The effectiveness of most wakeup-free...
Jie S. Hu, Narayanan Vijaykrishnan, Mary Jane Irwi...