Sciweavers

599 search results - page 87 / 120
» Hide-and-Seek with Directional Sensing
Sort
View
JSS
2006
110views more  JSS 2006»
13 years 9 months ago
Beyond source code: The importance of other artifacts in software development (a case study)
Current software systems contain increasingly more elements that have not usually been considered in software engineering research and studies. Source artifacts, understood as the...
Gregorio Robles, Jesús M. González-B...
JCB
2007
92views more  JCB 2007»
13 years 9 months ago
Neighbor Joining Algorithms for Inferring Phylogenies via LCA Distances
Reconstructing phylogenetic trees efficiently and accurately from distance estimates is an ongoing challenge in computational biology from both practical and theoretical consider...
Ilan Gronau, Shlomo Moran
IANDC
2000
64views more  IANDC 2000»
13 years 9 months ago
Bisimilarity of Open Terms
The standard way of lifting a binary relation, R, from closed terms of an algebra to open terms is to de ne its closed-instance extension, Rci, which holds for a given pair of ope...
Arend Rensink
PUC
2000
107views more  PUC 2000»
13 years 9 months ago
Implicit Human Computer Interaction Through Context
In this paper the term implicit human computer interaction is defined. It is discussed how the availability of processing power and advanced sensing technology can enable a shift ...
Albrecht Schmidt
SIGKDD
2000
96views more  SIGKDD 2000»
13 years 9 months ago
Phenomenal Data Mining: From Data to Phenomena
Phenomenal data mining finds relations between the data and the phenomena that give rise to data rather than just relations among the data. For example, suppose supermarket cash r...
John McCarthy