Sciweavers

897 search results - page 88 / 180
» Identity: How to name it, How to find it
Sort
View
GECCO
2003
Springer
182views Optimization» more  GECCO 2003»
15 years 7 months ago
Modeling the Search Landscape of Metaheuristic Software Clustering Algorithms
Abstract. Software clustering techniques are useful for extracting architectural information about a system directly from its source code structure. This paper starts by examining ...
Brian S. Mitchell, Spiros Mancoridis
137
Voted
ALP
1992
Springer
15 years 5 months ago
Definitional Trees
Rewriting is a computational paradigm that specifies the actions, but not the control. We introduce a hierarchical structure repreat a high level of abstraction, a form of control....
Sergio Antoy
DUX
2007
15 years 5 months ago
Responsibilities and implications: further thoughts on ethnography and design
Many researchers and practitioners in user experience design have turned towards social sciences to find ways to understand the social contexts in which both users and technologie...
Paul Dourish
117
Voted
CDC
2008
IEEE
166views Control Systems» more  CDC 2008»
15 years 3 months ago
Distributed coverage verification in sensor networks without location information
In this paper, we present a series of distributed algorithms for coverage verification in sensor networks with no location information. We demonstrate how, in the absence of locali...
Alireza Tahbaz-Salehi, Ali Jadbabaie
ICWSM
2010
15 years 3 months ago
Governance in Social Media: A Case Study of the Wikipedia Promotion Process
Social media sites are often guided by a core group of committed users engaged in various forms of governance. A crucial aspect of this type of governance is deliberation, in whic...
Jure Leskovec, Daniel P. Huttenlocher, Jon M. Klei...