Sciweavers

8795 search results - page 1667 / 1759
» Measuring Generality of Documents
Sort
View
CIVR
2010
Springer
160views Image Analysis» more  CIVR 2010»
15 years 4 months ago
Today's and tomorrow's retrieval practice in the audiovisual archive
Content-based video retrieval is maturing to the point where it can be used in real-world retrieval practices. One such practice is the audiovisual archive, whose users increasing...
Bouke Huurnink, Cees G. M. Snoek, Maarten de Rijke...
GECCO
2010
Springer
254views Optimization» more  GECCO 2010»
15 years 4 months ago
Evolving viral marketing strategies
One method of viral marketing involves seeding certain consumers within a population to encourage faster adoption of the product throughout the entire population. However, determi...
Forrest Stonedahl, William Rand, Uri Wilensky
ICSE
2010
IEEE-ACM
15 years 4 months ago
Characterizing and predicting which bugs get fixed: an empirical study of Microsoft Windows
We performed an empirical study to characterize factors that affect which bugs get fixed in Windows Vista and Windows 7, focusing on factors related to bug report edits and relat...
Philip J. Guo, Thomas Zimmermann, Nachiappan Nagap...
ICSE
2010
IEEE-ACM
15 years 4 months ago
An analysis of the variability in forty preprocessor-based software product lines
Over 30 years ago, the preprocessor cpp was developed to extend the programming language C by lightweight metaprogramming capabilities. Despite its error-proneness and low ion lev...
Jörg Liebig, Sven Apel, Christian Lengauer, C...
LCTRTS
2010
Springer
15 years 4 months ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul
« Prev « First page 1667 / 1759 Last » Next »