Sciweavers

951 search results - page 52 / 191
» Suggestions for OWL 3
Sort
View
ICSE
2004
IEEE-ACM
15 years 10 months ago
Mining Version Histories to Guide Software Changes
We apply data mining to version histories in order to guide programmers along related changes: "Programmers who changed these functions also changed...." Given a set of e...
Andreas Zeller, Peter Weißgerber, Stephan Di...
VISUALIZATION
1998
IEEE
15 years 2 months ago
View dependent isosurface extraction
: We present a dynamic view-dependent isosurface extraction method. Our approach is based on the 3-stage approach we first suggested in WISE [15], i.e., front-to-back traversal, so...
Yarden Livnat, Charles D. Hansen
ASIACRYPT
2008
Springer
14 years 11 months ago
A New Attack on the LEX Stream Cipher
Abstract. In [6], Biryukov presented a new methodology of stream cipher design, called leak extraction. The stream cipher LEX, based on this methodology and on the AES block cipher...
Orr Dunkelman, Nathan Keller
CORR
1998
Springer
145views Education» more  CORR 1998»
14 years 9 months ago
Anchoring a Lexicalized Tree-Adjoining Grammar for Discourse
We here explore a "fully" lexicalized Tree-Adjoining Grammar for discourse that takes the basic elements of a (monologic) discourse to be not simply clauses, but larger ...
Bonnie L. Webber, Aravind K. Joshi
CHI
2009
ACM
15 years 10 months ago
Remembrance of things tagged: how tagging effort affects tag production and human memory
We developed a low-effort interaction method called Click2Tag for social bookmarking. Information foraging theory predicts that the production of tags will increase as the effort ...
Raluca Budiu, Peter Pirolli, Lichan Hong