Sciweavers

1629 search results - page 232 / 326
» A Study of Malcode-Bearing Documents
Sort
View
HICSS
2000
IEEE
141views Biometrics» more  HICSS 2000»
14 years 8 days ago
Turning Tacit Knowledge Tangible
People are able to determine whether or not a given document is interesting just by glancing through it. However, when asked to make explicit the rules upon which such a decision ...
Dick Stenmark
ICCAD
2000
IEEE
99views Hardware» more  ICCAD 2000»
14 years 8 days ago
On Mismatches between Incremental Optimizers and Instance Perturbations in Physical Design Tools
The incremental, “construct by correction” design methodology has become widespread in constraint-dominated DSM design. We study the problem of ECO for physical design domains...
Andrew B. Kahng, Stefanus Mantik
ACMDIS
2000
ACM
14 years 6 days ago
Just-in-Time Design in a Fast-Paced Product Group
In real world development environments where deadlines are fixed, a designer must craft a process that works with the team and within the constraints of a project. The traditional...
Margo Lustig Ezekiel
SIGIR
1999
ACM
14 years 4 days ago
Visualization of Search Results: A Comparative Evaluation of Text, 2D, and 3D Interfaces
Although there have been many prototypes of visualization in support of information retrieval, there has been little systematic evaluation that distinguishes the benefits of the v...
Marc M. Sebrechts, John Cugini, Sharon J. Laskowsk...
ICSM
1999
IEEE
14 years 4 days ago
Bunch: A Clustering Tool for the Recovery and Maintenance of Software System Structures
Software systems are typically modified in order to extend or change their functionality, improve their performance, port them to different platforms, and so on. For developers, i...
Spiros Mancoridis, Brian S. Mitchell, Yih-Farn Che...