Sciweavers

3316 search results - page 322 / 664
» Mining Software Engineering Data
Sort
View
112
Voted
IADIS
2008
15 years 4 months ago
An E-Learning System To Prepare Negotiations
The goal of this article is to propose an environment for negotiation e-learning courses using a workflow approach to help learners to prepare the negotiation. This environment is...
Sérgio Assis Rodrigues, Yann Duzert, Jano M...
125
Voted
CODES
2000
IEEE
15 years 8 months ago
Co-design of interleaved memory systems
Memory interleaving is a cost-efficient approach to increase bandwidth. Improving data access locality and reducing memory access conflicts are two important aspects to achieve hi...
Hua Lin, Wayne Wolf
139
Voted
CCECE
2011
IEEE
14 years 3 months ago
Towards a portable, memory-efficient test system for Conducted Energy Weapons
We present a readily portable, memory-efficient performance test system (PTS) for Tasers. The proposed PTS has been developped for the most widely used Conducted Energy Weapons (...
Peyman Rahmati, David Dawson, Andy Adler
SCAM
2006
IEEE
15 years 9 months ago
Constructing Accurate Application Call Graphs For Java To Model Library Callbacks
Call graphs are widely used to represent calling relationships among methods. However, there is not much interest in calling relationships among library methods in many software e...
Weilei Zhang, Barbara G. Ryder
119
Voted
CSE
2009
IEEE
15 years 10 months ago
Noise Injection for Search Privacy Protection
Abstract—Extensive work has been devoted to private information retrieval and privacy preserving data mining. To protect user privacy from search engines, however, most current a...
Shaozhi Ye, Shyhtsun Felix Wu, Raju Pandey, Hao Ch...