Sciweavers

1632 search results - page 215 / 327
» Topological Analysis of Refinement
Sort
View
TVCG
2010
217views more  TVCG 2010»
14 years 9 months ago
How Information Visualization Novices Construct Visualizations
—It remains challenging for information visualization novices to rapidly construct visualizations during exploratory data analysis. We conducted an exploratory laboratory study i...
Lars Grammel, Melanie Tory, Margaret-Anne D. Store...
ACL
2010
14 years 9 months ago
Profiting from Mark-Up: Hyper-Text Annotations for Guided Parsing
We show how web mark-up can be used to improve unsupervised dependency parsing. Starting from raw bracketings of four common HTML tags (anchors, bold, italics and underlines), we ...
Valentin I. Spitkovsky, Daniel Jurafsky, Hiyan Als...
MODELS
2010
Springer
14 years 9 months ago
transML: A Family of Languages to Model Model Transformations
Model transformation is one of the pillars of Model-Driven Engineering (MDE). The increasing complexity of systems and modelling languages has dramatically raised the complexity an...
Esther Guerra, Juan de Lara, Dimitrios S. Kolovos,...
81
Voted
EDM
2009
127views Data Mining» more  EDM 2009»
14 years 9 months ago
How do Students Organize Personal Information Spaces?
The purpose of this study is to empirically reveal strategies of students' organization of learning-related digital materials within an online personal information archive. Re...
Sharon Hardof-Jaffe, Arnon Hershkovitz, Hama Abu-K...
ICST
2009
IEEE
14 years 9 months ago
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking
Bounded model checking--as well as symbolic equivalence checking--are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC ha...
Hendrik Post, Carsten Sinz