Sciweavers

3511 search results - page 607 / 703
» Evaluation Methods for Groupware Systems
Sort
View
ESORICS
2009
Springer
14 years 8 months ago
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in...
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang,...
SIGMOD
2003
ACM
152views Database» more  SIGMOD 2003»
14 years 8 months ago
Using Sets of Feature Vectors for Similarity Search on Voxelized CAD Objects
In modern application domains such as multimedia, molecular biology and medical imaging, similarity search in database systems is becoming an increasingly important task. Especial...
Hans-Peter Kriegel, Stefan Brecheisen, Peer Kr&oum...
ICSE
2004
IEEE-ACM
14 years 8 months ago
SNIAFL: Towards a Static Non-Interactive Approach to Feature Location
To facilitate software maintenance and evolution, a helpful step is to locate features concerned in a particular maintenance task. In the literature, both dynamic and interactive ...
Wei Zhao, Lu Zhang, Yin Liu, Jiasu Sun, Fuqing Yan...
WWW
2010
ACM
14 years 3 months ago
Exploring searcher interactions for distinguishing types of commercial intent
An improved understanding of the relationship between search intent, result quality, and searcher behavior is crucial for improving the effectiveness of web search. While recent p...
Qi Guo, Eugene Agichtein
CHI
2010
ACM
14 years 3 months ago
Newport: enabling sharing during mobile calls
Newport is a collaborative application for sharing context (e.g. location) and content (e.g. photos and notes) during mobile phone calls. People can share during a phone call and ...
Junius Gunaratne, A. J. Bernheim Brush