Sciweavers

1829 search results - page 286 / 366
» aims 2008
Sort
View
CHI
2008
ACM
15 years 29 days ago
Testing vs. code inspection vs. what else?: male and female end users' debugging strategies
Little is known about the strategies end-user programmers use in debugging their programs, and even less is known about gender differences that may exist in these strategies. With...
Neeraja Subrahmaniyan, Laura Beckwith, Valentina G...
CIKM
2008
Springer
15 years 29 days ago
Social tags: meaning and suggestions
This paper aims to quantify two common assumptions about social tagging: (1) that tags are “meaningful” and (2) that the tagging process is influenced by tag suggestions. For...
Fabian M. Suchanek, Milan Vojnovic, Dinan Gunaward...
CLEF
2009
Springer
15 years 29 days ago
Patent Retrieval Experiments in the Context of the CLEF IP Track 2009
At CLEF 2009 the University of Hildesheim focused on the main task of the Intellectual Property Track which aims at finding prior art for a specified patent [cf. Information Retri...
Daniela Becks, Christa Womser-Hacker, Thomas Mandl...
FGR
2008
IEEE
246views Biometrics» more  FGR 2008»
15 years 28 days ago
Discriminant analysis for perceptionally comparable classes
Traditional discriminate analysis treats all the involved classes equally in the computation of the between-class scatter matrix. However, we find that for many vision tasks, the...
Bingpeng Ma, Shiguang Shan, Xilin Chen, Wen Gao
FSKD
2008
Springer
128views Fuzzy Logic» more  FSKD 2008»
15 years 28 days ago
Applying Fuzzy PROMETHEE Method for Evaluating IS Outsourcing Suppliers
The demand for outsourcing in the information systems (IS) field has become a part of basic corporate strategy and has experienced a considerable growth in recent years. The proce...
Tien-Chin Wang, L. Y. Chen, Ying-Hsiu Chen