Sciweavers

897 search results - page 34 / 180
» Identity: How to name it, How to find it
Sort
View
ECIS
2000
13 years 10 months ago
Chief Information Officer Influence: An Exploratory Study
- Effective initiation and execution of IS/T projects and systems has become a critical core competence for many organizations. One key to this is the influence of the senior execu...
Harvey G. Enns, Sid L. Huff
VL
2010
IEEE
247views Visual Languages» more  VL 2010»
13 years 7 months ago
Cleanroom: Edit-Time Error Detection with the Uniqueness Heuristic
Many dynamic programming language features, such as implicit declaration, reflection, and code generation, make it difficult to verify the existence of identifiers through standar...
Andrew J. Ko, Jacob O. Wobbrock
CBSE
2007
Springer
14 years 2 months ago
Data Encapsulation in Software Components
Data encapsulation is a familiar property in object-oriented programming. It is not only useful for modelling things in the real world, but it also facilitates reuse by enabling th...
Kung-Kiu Lau, Faris M. Taweel
IEEEPACT
1999
IEEE
14 years 29 days ago
Memory System Support for Image Processing
Image processing applications tend to access their data non-sequentially and reuse that data infrequently. As a result, they tend to perform poorly on conventional memory systems ...
Lixin Zhang, John B. Carter, Wilson C. Hsieh, Sall...
ICALT
2010
IEEE
13 years 9 months ago
What You Check is What You Get: Authoring with jEditOQMath
Abstract--jEditOQMath is an authoring tool for the intelligent learning environment ActiveMath. Its editing interface is a simple source editor. However the wealth and power of the...
Paul Libbrecht