Sciweavers

13476 search results - page 2576 / 2696
» Learning from Streams
Sort
View
DPPI
2007
ACM
15 years 7 months ago
Reverse alarm clock: a research through design example of designing for the self
This paper documents a first attempt at "designing for the self", an approach to designing products intended to help people move closer to their idealized sense of self a...
Kursat Kursat Ozenc, James P. Brommer, Bong-keum J...
ECLIPSE
2007
ACM
15 years 7 months ago
Predicting buggy changes inside an integrated development environment
We present a tool that predicts whether the software under development inside an IDE has a bug. An IDE plugin performs this prediction, using the Change Classification technique t...
Janaki T. Madhavan, E. James Whitehead Jr.
COMPGEOM
2010
ACM
15 years 7 months ago
Manifold reconstruction using tangential Delaunay complexes
We give a provably correct algorithm to reconstruct a kdimensional manifold embedded in d-dimensional Euclidean space. Input to our algorithm is a point sample coming from an unkn...
Jean-Daniel Boissonnat, Arijit Ghosh
GBRPR
2007
Springer
15 years 7 months ago
An Efficient Ontology-Based Expert Peering System
Abstract. This paper proposes an expert peering system for information exchange. Our objective is to develop a real-time search engine for an online community where users can ask e...
Tansu Alpcan, Christian Bauckhage, Sachin Agarwal
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
15 years 7 months ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis
« Prev « First page 2576 / 2696 Last » Next »