Sciweavers

1553 search results - page 177 / 311
» Democracy Functions of Information Technology
Sort
View
KBSE
1997
IEEE
14 years 2 months ago
Applying Concept Formation Methods to Object Identification in Procedural Code
Legacy software systems present a high level of entropy combined with imprecise documentation. This makes their maintenance more difficult, more time consuming, and costlier. In o...
Houari A. Sahraoui, Walcélio L. Melo, Hakim...
ASSETS
2007
ACM
14 years 2 months ago
Using participatory activities with seniors to critique, build, and evaluate mobile phones
Mobile phones can provide a number of benefits to older people. However, most mobile phone designs and form factors are targeted at younger people and middle-aged adults. To infor...
Michael Massimi, Ronald M. Baecker, Michael Wu
IMECS
2007
14 years 5 days ago
Approaches to an Adaptive Middleware for Mobile Services
Abstract—Adaptive middleware and wireless networks are hot topics in many discussions today. Literature describes a lot of approaches which are based upon existing middleware tec...
Ulrich Dümichen, Uwe Baumgarten
CLEF
2010
Springer
13 years 12 months ago
Cross-document Coreference for WePS
A good clustering performance depends on the quality of the distance function used to asses similarity. In this paper we propose a pairwise document coreference model to improve pe...
Iustin Dornescu, Constantin Orasan, Tatiana Lesnik...
CLEF
2010
Springer
13 years 12 months ago
A Textual-Based Similarity Approach for Efficient and Scalable External Plagiarism Analysis - Lab Report for PAN at CLEF 2010
In this paper we present an approach to detect external plagiarism based on textual similarity. This is an efficient and precise method that can be applied over large sets of docum...
Daniel Micol, Óscar Ferrández, Ferna...