Little is known about the strategies end-user programmers use in debugging their programs, and even less is known about gender differences that may exist in these strategies. With...
Neeraja Subrahmaniyan, Laura Beckwith, Valentina G...
This paper aims to quantify two common assumptions about social tagging: (1) that tags are “meaningful” and (2) that the tagging process is influenced by tag suggestions. For...
Fabian M. Suchanek, Milan Vojnovic, Dinan Gunaward...
At CLEF 2009 the University of Hildesheim focused on the main task of the Intellectual Property Track which aims at finding prior art for a specified patent [cf. Information Retri...
Daniela Becks, Christa Womser-Hacker, Thomas Mandl...
Traditional discriminate analysis treats all the involved classes equally in the computation of the between-class scatter matrix. However, we find that for many vision tasks, the...
The demand for outsourcing in the information systems (IS) field has become a part of basic corporate strategy and has experienced a considerable growth in recent years. The proce...