Sciweavers

315 search results - page 21 / 63
» Claims Analysis
Sort
View
IWPC
2005
IEEE
15 years 9 months ago
An Empirical Study of the Use of Friends in C++ Software
A commonly held belief is that the friend construct in C++ is a violation of encapsulation. However, little empirical analysis of its use has taken place to provide evidence to su...
Michael English, Jim Buckley, Tony Cahill, Kristia...
ICECCS
2007
IEEE
89views Hardware» more  ICECCS 2007»
15 years 7 months ago
Just-in-Time Certification
Traditional, standards-based approaches to certification are hugely expensive, of questionable credibility when development is outsourced, and a barrier to innovation. This paper ...
John M. Rushby
KDD
2006
ACM
150views Data Mining» more  KDD 2006»
16 years 4 months ago
Maximally informative k-itemsets and their efficient discovery
In this paper we present a new approach to mining binary data. We treat each binary feature (item) as a means of distinguishing two sets of examples. Our interest is in selecting ...
Arno J. Knobbe, Eric K. Y. Ho
ICDAR
2005
IEEE
15 years 9 months ago
Discriminant Substrokes for Online Handwriting Recognition
A discriminant-based framework for automatic recognition of online handwriting data is presented in this paper. We identify the substrokes that are more useful in discriminating b...
Karteek Alahari, Satya Lahari Putrevu, C. V. Jawah...
HT
2003
ACM
15 years 9 months ago
Untangling compound documents on the web
Most text analysis is designed to deal with the concept of a “document”, namely a cohesive presentation of thought on a unifying subject. By contrast, individual nodes on the ...
Nadav Eiron, Kevin S. McCurley