Sciweavers

11211 search results - page 1998 / 2243
» Rank-Sensitive Data Structures
Sort
View
WWW
2010
ACM
15 years 8 months ago
Web-scale knowledge extraction from semi-structured tables
A wealth of knowledge is encoded in the form of tables on the World Wide Web. We propose a classification algorithm and a rich feature set for automatically recognizing layout tab...
Eric Crestan, Patrick Pantel
150
Voted
ECMDAFA
2010
Springer
207views Hardware» more  ECMDAFA 2010»
15 years 8 months ago
An Automated Approach to Transform Use Cases into Activity Diagrams
Use cases are commonly used to structure and document requirements while UML activity diagrams are often used to visualize and formalize use cases, for example to support automated...
Tao Yue, Lionel C. Briand, Yvan Labiche
ICSE
2010
IEEE-ACM
15 years 8 months ago
Codebook: discovering and exploiting relationships in software repositories
Large-scale software engineering requires communication and collaboration to successfully build and ship products. We conducted a survey with Microsoft engineers on inter-team coo...
Andrew Begel, Yit Phang Khoo, Thomas Zimmermann
CDC
2009
IEEE
179views Control Systems» more  CDC 2009»
15 years 8 months ago
Bayesian network approach to understand regulation of biological processes in cyanobacteria
— Bayesian networks have extensively been used in numerous fields including artificial intelligence, decision theory and control. Its ability to utilize noisy and missing data ...
Thanura R. Elvitigala, Abhay K. Singh, Himadri B. ...
131
Voted
JTRES
2009
ACM
15 years 8 months ago
A technology compatibility kit for safety critical Java
Safety Critical Java is a specification being built on top a subset of interfaces from the Real-Time Specification for Java. It is designed to ease development and analysis of s...
Lei Zhao, Daniel Tang, Jan Vitek
« Prev « First page 1998 / 2243 Last » Next »