Sciweavers

1239 search results - page 183 / 248
» Generating Web Applications from Use Case Scenarios
Sort
View
144
Voted
ISSTA
2009
ACM
15 years 10 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...
149
Voted
DAC
2007
ACM
16 years 4 months ago
Period Optimization for Hard Real-time Distributed Automotive Systems
The complexity and physical distribution of modern active-safety automotive applications requires the use of distributed architectures. These architectures consist of multiple ele...
Abhijit Davare, Qi Zhu, Marco Di Natale, Claudio P...
128
Voted
SIGDOC
2009
ACM
15 years 10 months ago
Facilita: reading assistance for low-literacy readers
Texts are the media content primarily available on Web sites and applications. However, this heavy use of texts creates an accessibility barrier to those who cannot read fluently...
Willian Massami Watanabe, Arnaldo Candido Junior, ...
120
Voted
ICDS
2009
IEEE
15 years 10 months ago
A Hybrid Approach for Clustering-Based Data Aggregation in Wireless Sensor Networks
—In a wireless sensor network application for tracking multiple mobile targets, large amounts of sensing data can be generated by a number of sensors. These data must be controll...
Woo Sung Jung, Keun Woo Lim, Young-Bae Ko, Sang-Jo...
129
Voted
HICSS
2006
IEEE
108views Biometrics» more  HICSS 2006»
15 years 9 months ago
Matching People and Jobs: A Bilateral Recommendation Approach
Recommendation systems are widely used on the Internet to assist customers in finding the products or services that best fit with their individual preferences. While current imple...
Jochen Malinowski, Tobias Keim, Oliver Wendt, Tim ...