Sciweavers

1558 search results - page 203 / 312
» Effective Analysis and Design of Computer-Supported Learning...
Sort
View
CSMR
2004
IEEE
15 years 8 months ago
Source Code Modularization Using Lattice of Concept Slices
Most legacy systems have been altered due to prolonged maintenance to the point that they deviate significantly from their original and intended design and consequently, they lack...
Raihan Al-Ekram, Kostas Kontogiannis
CCR
2004
151views more  CCR 2004»
15 years 4 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
CVPR
2007
IEEE
16 years 6 months ago
Recognizing Night Walkers Based on One Pseudoshape Representation of Gait
Gait is a promising biometric cue which can facilitate the recognition of human beings, particularly when other biometrics are unavailable. Existing work for gait recognition, how...
Daoliang Tan, Kaiqi Huang, Shiqi Yu, Tieniu Tan
CAISE
2009
Springer
15 years 11 months ago
A Method for Service Identification from Business Process Models in a SOA Approach
Abstract. Various approaches for services development in SOA propose business processes as a starting point. However, there is a lack of systematic methods for services identificat...
Leonardo Guerreiro Azevedo, Flávia Maria Sa...
SIGDOC
2009
ACM
15 years 11 months ago
The macro-structure of use of help
Users of help systems often complain that they do not find them useful; while they still use help at least occasionally, they resort to other problem-solving strategies. In this p...
Oscar D. Andrade, Nathaniel Bean, David G. Novick