Sciweavers

963 search results - page 111 / 193
» Escape Analysis on Lists
Sort
View
103
Voted
DOCENG
2006
ACM
15 years 6 months ago
Minimum sized text containment shapes
In many text-processing applications, we would like shapes that expand (or shrink) in size to fit their textual content. We address how to efficiently compute the minimum size fo...
Nathan Hurst, Kim Marriott, Peter Moulder
125
Voted
JCDL
2006
ACM
237views Education» more  JCDL 2006»
15 years 6 months ago
Automatic extraction of table metadata from digital documents
Tables are used to present, list, summarize, and structure important data in documents. In scholarly articles, they are often used to present the relationships among data and high...
Ying Liu, Prasenjit Mitra, C. Lee Giles, Kun Bai
97
Voted
MSR
2006
ACM
15 years 6 months ago
Mining email social networks in Postgres
Open Source Software (OSS) projects provide a unique opportunity to gather and analyze publicly available historical data. The Postgres SQL server, for example, has over seven yea...
Christian Bird, Alex Gourley, Premkumar T. Devanbu...
COMPSAC
2005
IEEE
15 years 6 months ago
Exception Handling in Coordination-Based Mobile Environments
Mobile agent systems have many attractive features including asynchrony, openness, dynamicity and anonymity, which makes them indispensable in designing complex modern application...
Alexei Iliasov, Alexander B. Romanovsky
SIGDOC
2005
ACM
15 years 6 months ago
A study of the documentation essential to software maintenance
Software engineering has been striving for years to improve the practice of software development and maintenance. Documentation has long been prominent on the list of recommended ...
Sergio Cozzetti B. de Souza, Nicolas Anquetil, K&a...