Sciweavers

851 search results - page 70 / 171
» History Effects and Verification
Sort
View
ICWE
2009
Springer
15 years 5 months ago
Semantic web access prediction using WordNet
The user observed latency of retrieving Web documents is one of limiting factors while using the Internet as an information data source. Prefetching became important technique ...
Lenka Hapalova
MSR
2011
ACM
14 years 4 months ago
An empirical analysis of the FixCache algorithm
The FixCache algorithm, introduced in 2007, effectively identifies files or methods which are likely to contain bugs by analyzing source control repository history. However, many ...
Caitlin Sadowski, Chris Lewis 0002, Zhongpeng Lin,...
KDD
2009
ACM
162views Data Mining» more  KDD 2009»
16 years 2 months ago
Augmenting the generalized hough transform to enable the mining of petroglyphs
Rock art is an archaeological term for human-made markings on stone. It is believed that there are millions of petroglyphs in North America alone, and the study of this valued cul...
Eamonn J. Keogh, Qiang Zhu 0002, Sang-Hee Lee, Xia...
ACL
2008
15 years 3 months ago
Intensional Summaries as Cooperative Responses in Dialogue: Automation and Evaluation
Despite its long history, and a great deal of research producing many useful algorithms and observations, research in cooperative response generation has had little impact on the ...
Joseph Polifroni, Marilyn A. Walker
MEDIAFORENSICS
2010
15 years 3 months ago
On detection of median filtering in digital images
In digital image forensics, it is generally accepted that intentional manipulations of the image content are most critical and hence numerous forensic methods focus on the detecti...
Matthias Kirchner, Jessica J. Fridrich