Sciweavers

1760 search results - page 293 / 352
» A System to Mark Programs Automatically
Sort
View
116
Voted
MSR
2009
ACM
15 years 9 months ago
The promises and perils of mining git
We are now witnessing the rapid growth of decentralized source code management (DSCM) systems, in which every developer has her own repository. DSCMs facilitate a style of collabo...
Christian Bird, Peter C. Rigby, Earl T. Barr, Davi...
OZCHI
2006
ACM
15 years 8 months ago
AuraOrb: using social awareness cues in the design of progressive notification appliances
One of the problems with notification appliances is that they can be distracting when providing information not of immediate interest to the user. In this paper, we present AuraOr...
Mark Altosaar, Roel Vertegaal, Changuk Sohn, Danie...
137
Voted
HCI
2007
15 years 4 months ago
User Expectations from Dictation on Mobile Devices
Mobile phones, with their increasing processing power and memory, are enabling a diversity of tasks. The traditional text entry method using keypad is falling short in numerous way...
Santosh Basapur, Shuang Xu, Mark Ahlenius, Young S...
BMCBI
2006
122views more  BMCBI 2006»
15 years 2 months ago
BioMoby extensions to the Taverna workflow management and enactment software
Background: As biology becomes an increasingly computational science, it is critical that we develop software tools that support not only bioinformaticians, but also bench biologi...
Edward A. Kawas, Martin Senger, Mark D. Wilkinson
126
Voted
SIGSOFT
2007
ACM
16 years 3 months ago
Mining specifications of malicious behavior
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic t...
Mihai Christodorescu, Somesh Jha, Christopher Krue...