Sciweavers

6300 search results - page 314 / 1260
» We have it easy, but do we have it right
Sort
View
COMPSAC
2010
IEEE
14 years 12 months ago
An Analysis of Tool-Based Research in Software Engineering
Many research approaches in software engineering propose models or extensions to existing models. This includes system models, such as UML models, and project management artifacts,...
Jonas Helming, Maximilian Koegel, Hoda Naguib, Mir...
104
Voted
ECIR
2009
Springer
14 years 11 months ago
Investigating the Global Semantic Impact of Speech Recognition Error on Spoken Content Collections
Abstract. Errors in speech recognition transcripts have a negative impact on effectiveness of content-based speech retrieval and present a particular challenge for collections cont...
Martha Larson, Manos Tsagkias, Jiyin He, Maarten d...
170
Voted
ICSE
2011
IEEE-ACM
14 years 5 months ago
Inference of field initialization
A raw object is partially initialized, with only some fields set to legal values. It may violate its object invariants, such as that a given field is non-null. Programs often ma...
Fausto Spoto, Michael D. Ernst
ACL
2010
14 years 11 months ago
All Words Domain Adapted WSD: Finding a Middle Ground between Supervision and Unsupervision
In spite of decades of research on word sense disambiguation (WSD), all-words general purpose WSD has remained a distant goal. Many supervised WSD systems have been built, but the...
Mitesh M. Khapra, Anup Kulkarni, Saurabh Sohoney, ...
IMC
2004
ACM
15 years 7 months ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese