Sciweavers

2421 search results - page 332 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
WEBDB
2009
Springer
124views Database» more  WEBDB 2009»
15 years 11 months ago
Bridging the Terminology Gap in Web Archive Search
Web archives play an important role in preserving our cultural heritage for future generations. When searching them, a serious problem arises from the fact that terminology evolve...
Klaus Berberich, Srikanta J. Bedathur, Mauro Sozio...
WOWMOM
2009
ACM
204views Multimedia» more  WOWMOM 2009»
15 years 9 months ago
ECTC: Energy effiCient topology control algorithm for wireless sensor networks
Sensor network which operates on battery are used to gather data in a variety of environments. The data collected by each node is communicated through the network to the sink, whi...
Nedal Ababneh, Anastasios Viglas, Houda Labiod, Na...
159
Voted
SIGMOD
2006
ACM
121views Database» more  SIGMOD 2006»
15 years 10 months ago
Derby/S: a DBMS for sample-based query answering
Although approximate query processing is a prominent way to cope with the requirements of data analysis applications, current database systems do not provide integrated and compre...
Anja Klein, Rainer Gemulla, Philipp Rösch, Wo...
SOFTVIS
2005
ACM
15 years 10 months ago
CVSscan: visualization of code evolution
During the life cycle of a software system, the source code is changed many times. We study how developers can be enabled to get insight in these changes, in order to understand t...
Lucian Voinea, Alexandru Telea, Jarke J. van Wijk
119
Voted
IUI
2004
ACM
15 years 10 months ago
Making critiquing practical: incremental development of educational critiquing systems
Expert critiquing systems in education can support teachers in providing high quality individualized feedback to students. These systems, however, require significant development ...
Lin Qiu, Christopher Riesbeck