Sciweavers

963 search results - page 88 / 193
» Escape Analysis on Lists
Sort
View
BMCBI
2006
155views more  BMCBI 2006»
15 years 20 days ago
A powerful method for detecting differentially expressed genes from GeneChip arrays that does not require replicates
Background: Studies of differential expression that use Affymetrix GeneChip arrays are often carried out with a limited number of replicates. Reasons for this include financial co...
Anne-Mette K. Hein, Sylvia Richardson
151
Voted
CORR
2004
Springer
177views Education» more  CORR 2004»
15 years 14 days ago
Typestate Checking and Regular Graph Constraints
We introduce regular graph constraints and explore their decidability properties. The motivation for regular graph constraints is 1) type checking of changing types of objects in ...
Viktor Kuncak, Martin C. Rinard
HICSS
2006
IEEE
123views Biometrics» more  HICSS 2006»
15 years 6 months ago
Core and Periphery in Free/Libre and Open Source Software Team Communications
The concept of the core group of developers is important and often discussed in empirical studies of FLOSS projects. This paper examines the question, “how does one empirically ...
Kevin Crowston, Kangning Wei, Qing Li, James Howis...
75
Voted
MSR
2006
ACM
15 years 6 months ago
How long did it take to fix bugs?
The number of bugs (or fixes) is a common factor used to measure the quality of software and assist bug related analysis. For example, if software files have many bugs, they may b...
Sunghun Kim, E. James Whitehead Jr.
87
Voted
MICCAI
2000
Springer
15 years 4 months ago
Needs Assessment for Computer-Integrated Surgery Systems
The needs of surgeons for computer-assisted systems cannot be satisfied unless their requirements and expectations are known. We determined surgeons' needs for computer-aided ...
Sarah Graham, Russell H. Taylor, Michael W. Vannie...