Sciweavers

4004 search results - page 66 / 801
» How Many Packets Can We Encode
Sort
View
CHI
2010
ACM
15 years 9 months ago
Now let me see where i was: understanding how lifelogs mediate memory
Lifelogging technologies can capture both mundane and important experiences in our daily lives, resulting in a rich record of the places we visit and the things we see. This study...
Vaiva Kalnikaité, Abigail Sellen, Steve Whi...
ATAL
2005
Springer
15 years 8 months ago
How local is that optimum? k-optimality for DCOP
In multi-agent systems where sets of joint actions (JAs) are generated, metrics are needed to evaluate these sets and efficiently allocate resources for the many JAs. For the case...
Jonathan P. Pearce, Rajiv T. Maheswaran, Milind Ta...
COMPSAC
2009
IEEE
15 years 7 months ago
How Well Do Test Case Prioritization Techniques Support Statistical Fault Localization
—In continuous integration, a tight integration of test case prioritization techniques and fault-localization techniques may both expose failures faster and locate faults more ef...
Bo Jiang, Zhenyu Zhang, T. H. Tse, Tsong Yueh Chen
CANDC
2009
ACM
15 years 9 months ago
Discovery is never by chance: designing for (un)serendipity
Serendipity has a long tradition in the history of science as having played a key role in many significant discoveries. Computer scientists, valuing the role of serendipity in dis...
Paul André, m. c. schraefel, Jaime Teevan, ...
CSMR
2008
IEEE
15 years 9 months ago
How Lisp Systems Look Different
Many reverse engineering approaches have been developed to analyze software systems written in different languages like C/C++ or Java. These approaches typically rely on a meta-mo...
Adrian Dozsa, Tudor Gîrba, Radu Marinescu