Sciweavers

6300 search results - page 940 / 1260
» We have it easy, but do we have it right
Sort
View
FAC
2010
140views more  FAC 2010»
14 years 11 months ago
From a domain analysis to the specification and detection of code and design smells
Code and design smells are recurring design problems in software systems that must be identified to avoid their possible negative consequences on development and maintenance. Conse...
Naouel Moha, Yann-Gaël Guéhéneu...
IJSDS
2010
162views more  IJSDS 2010»
14 years 11 months ago
Strategy as Action: From Porter to Anti-Porter
: In the post-crisis era new concepts are emerging, while some old and dysfunctional ones are being discarded. Strategy is about making series of decisions that drive corporate act...
Milan Zeleny
CCR
2011
14 years 8 months ago
IP geolocation databases: unreliable?
The most widely used technique for IP geolocation consists in building a database to keep the mapping between IP blocks and a geographic location. Several databases are available ...
Ingmar Poese, Steve Uhlig, Mohamed Ali Kâafa...
COLING
2010
14 years 8 months ago
Discriminative Training for Near-Synonym Substitution
Near-synonyms are useful knowledge resources for many natural language applications such as query expansion for information retrieval (IR) and paraphrasing for text generation. Ho...
Liang-Chih Yu, Hsiu-Min Shih, Yu-Ling Lai, Jui-Fen...
117
Voted
IJNSEC
2011
110views more  IJNSEC 2011»
14 years 8 months ago
An Anonymous Auction Protocol Based on GDH Assumption
The popularization and conveniences of Internet have changed traditional auction transactions into electronic auction via Internet. In 2006, Chang and Chang proposed an anonymous ...
Fuw-Yi Yang, Cai-Ming Liao