Sciweavers

97 search results - page 8 / 20
» Are refactorings less error-prone than other changes
Sort
View
DPPI
2007
ACM
13 years 11 months ago
My agent as myself or another: effects on credibility and listening to advice
Abstract. People consider other people who resemble them to be more persuasive. Users may consider embodied conversational agents, or ECAs, to be more persuasive if the agents rese...
Ian Li, Jodi Forlizzi, Anind K. Dey, Sara B. Kiesl...
SCAM
2003
IEEE
14 years 27 days ago
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef
PERCOM
2009
ACM
14 years 2 months ago
Adaptive Linear Filtering Compression on Realtime Sensor Networks
Abstract—We present a lightweight lossless compression algorithm for realtime sensor networks. Our proposed Adaptive Linear Filtering Compression (ALFC) algorithm performs predic...
Aaron B. Kiely, Mingsen Xu, Wen-Zhan Song, Renjie ...
ICNP
2007
IEEE
14 years 1 months ago
Cooperation Between Stations in Wireless Networks
Abstract— In a wireless network, mobile nodes (MNs) repeatedly perform tasks such as layer 2 (L2) handoff, layer 3 (L3) handoff and authentication. These tasks are critical, part...
Andrea G. Forte, Henning Schulzrinne
TABLETOP
2006
IEEE
14 years 1 months ago
MultiSpace: Enabling Electronic Document Micro-mobility in Table-Centric, Multi-Device Environments
Although electronic media has changed how people interact with documents, today’s electronic documents and the environments in which they are used are still impoverished relativ...
Katherine Everitt, Chia Shen, Kathy Ryall, Clifton...