Sciweavers

8706 search results - page 1680 / 1742
» Learning Subjective Language
Sort
View
126
Voted
AOSD
2006
ACM
15 years 8 months ago
Using aspects to support the software process: XP over Eclipse
Usually, aspects enhance a software product by being composed - or woven - into it. Here, on the other hand, we use aspects to support the software development process itself. The...
Oren Mishali, Shmuel Katz
CASES
2006
ACM
15 years 8 months ago
Adapting compilation techniques to enhance the packing of instructions into registers
The architectural design of embedded systems is becoming increasingly idiosyncratic to meet varying constraints regarding energy consumption, code size, and execution time. Tradit...
Stephen Hines, David B. Whalley, Gary S. Tyson
COMPGEOM
2006
ACM
15 years 8 months ago
Algorithms for two-box covering
We study the problem of covering a set of points or polyhedra in 3 with two axis-aligned boxes in order to minimize a function of the measures of the two boxes, such as the sum or...
Esther M. Arkin, Gill Barequet, Joseph S. B. Mitch...
HIKM
2006
ACM
15 years 8 months ago
Automatic document indexing in large medical collections
Term extraction relates to extracting the most characteristic or important terms (words or phrases) in a document. This information is commonly used for improving the accuracy of ...
Angelos Hliaoutakis, Kalliopi Zervanou, Euripides ...
103
Voted
ISSTA
2006
ACM
15 years 8 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
« Prev « First page 1680 / 1742 Last » Next »