Sciweavers

431 search results - page 28 / 87
» The five orders of ignorance
Sort
View
JSAC
2007
155views more  JSAC 2007»
14 years 11 months ago
Semantic social overlay networks
— Peer selection for query routing is a core task in peer-to-peer networks. Unstructured peer-to-peer systems (like Gnutella) ignore this problem, leading to an abundance of netw...
Alexander Löser, Steffen Staab, Christoph Tem...
SAJ
2000
80views more  SAJ 2000»
14 years 11 months ago
Handling diversity in group Work in the information systems class
Tertiary institutions in South Africa are faced with dealing with diversity in all its forms in our classrooms. Information Systems, Information Technology and Computer Science st...
T. Thomas, C. De Villiers
INFSOF
2002
65views more  INFSOF 2002»
14 years 11 months ago
The documentary structure of source code
Many tools designed to help programmers view and manipulate source code exploit the formal structure of the programming language. Language-based tools use information derived via ...
Michael L. Van de Vanter
CLEIEJ
2010
14 years 9 months ago
Quality Improvement in Annotated Code
In order to customize their behavior at runtime, a wide sort of modern frameworks do use code annotations at the applications classes as metadata configuration. However, despite i...
Diego A. A. Correia, Eduardo M. Guerra, Fáb...
HT
2010
ACM
14 years 9 months ago
Citation based plagiarism detection: a new approach to identify plagiarized work language independently
This paper describes a new approach towards detecting plagiarism and scientific documents that have been read but not cited. In contrast to existing approaches, which analyze docu...
Bela Gipp, Jöran Beel