Sciweavers

2111 search results - page 257 / 423
» How to Program Pervasive Systems
Sort
View
148
Voted
ECML
2007
Springer
15 years 9 months ago
Using Text Mining and Link Analysis for Software Mining
Many data mining techniques are these days in use for ontology learning – text mining, Web mining, graph mining, link analysis, relational data mining, and so on. In the current ...
Miha Grcar, Marko Grobelnik, Dunja Mladenic
125
Voted
APSEC
2005
IEEE
15 years 9 months ago
Call-Ordering Constraints
Several kinds of call-ordering problems have been identified, all of which present subtle difficulties in ensuring the correctness of a sequential program. They include object pro...
Nam Tran, David Abramson, Christine Mingins
109
Voted
LCPC
2004
Springer
15 years 9 months ago
Experiences in Using Cetus for Source-to-Source Transformations
Cetus is a compiler infrastructure for the source-to-source transformation of programs. Since its creation nearly three years ago, it has grown to over 12,000 lines of Java code, b...
Troy A. Johnson, Sang Ik Lee, Long Fei, Ayon Basum...
134
Voted
EDOC
2003
IEEE
15 years 8 months ago
Integrating CBSE, SoC, MDA, and AOP in a Software Development Method
Component-Based Software Engineering, Separation of Concerns, Model-Driven Architecture, and Aspect-Oriented Programming are four active research areas that have been around for s...
Raul Silaghi, Alfred Strohmeier
92
Voted
HICSS
2002
IEEE
95views Biometrics» more  HICSS 2002»
15 years 8 months ago
Simulation Spectrum and Stability Models
In this paper, we define a continuum of modeling styles, ranging from collections of very simple agents on one end to collections of very complex agents at the other end, and a s...
Christopher Landauer