Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
End-user programming provides a unique opportunity to study informal computer science education and knowledge acquisition in the real world. We seek to explore the use of communit...
workflow technology is becoming the key technologyfor businessprocess modeling, reengineering and automating. During the workflowspecification, enactment and administmtion, there ...
Chengfei Liu, Xuemin Lin, Xiaofang Zhou, Maria E. ...
As software systems grow in size and use more third-party libraries and frameworks, the need for developers to understand unfamiliar large codebases is rapidly increasing. In this...
This paper explores two classes of model adaptation methods for Web search ranking: Model Interpolation and error-driven learning approaches based on a boosting algorithm. The res...
Jianfeng Gao, Qiang Wu, Chris Burges, Krysta Marie...