Sciweavers

13004 search results - page 2498 / 2601
» Mining Software Data
Sort
View
107
Voted
CHI
2011
ACM
14 years 7 months ago
Antiquarian answers: book restoration as a resource for design
As technologies age, they experience wear and degradation, sometimes resulting in loss of functionality. In response, parts are replaced and software is updated. Yet restorationā€...
Daniela K. Rosner, Alex S. Taylor
126
Voted
CHI
2011
ACM
14 years 7 months ago
MemTable: an integrated system for capture and recall of shared histories in group workspaces
This paper presents the design, implementation, and evaluation of an interactive tabletop system that supports co-located meeting capture and asynchronous search and review of pas...
Seth E. Hunter, Pattie Maes, Stacey D. Scott, Henr...
CIDR
2011
337views Algorithms» more  CIDR 2011»
14 years 7 months ago
The Schema-Independent Database UI: A Proposed Holy Grail and Some Suggestions
If you have ever encountered a piece of highly domain-specific business software, you may have noticed that it was largely a graphical front-end to some relational database. You ...
Eirik Bakke, Edward Benson
160
Voted
CONIELECOMP
2011
IEEE
14 years 7 months ago
FPGA design and implementation for vertex extraction of polygonal shapes
This work focuses on developing systems of blocks in SIMULINK and VHDL to reuse on design of applications involving the recognition of polygonal objects. Usage of this work reduce...
Jorge Martínez-Carballido, Jorge Guevara-Es...
145
Voted
DIMVA
2011
14 years 7 months ago
An Assessment of Overt Malicious Activity Manifest in Residential Networks
While conventional wisdom holds that residential users experience a high degree of compromise and infection, this presumption has seen little validation in the way of an in-depth s...
Gregor Maier, Anja Feldmann, Vern Paxson, Robin So...
« Prev « First page 2498 / 2601 Last » Next »