Sciweavers

592 search results - page 116 / 119
» Learning of personalized security settings
Sort
View
159
Voted
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
15 years 6 months ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis
141
Voted
C5
2004
IEEE
15 years 6 months ago
Scratch: A Sneak Preview
information technologies as "the ability to reformulate knowledge, to express oneself creatively and appropriately, and to produce and generate information (rather than simply...
John Maloney, Leo Burd, Yasmin B. Kafai, Natalie R...
161
Voted
ICSE
2010
IEEE-ACM
15 years 4 months ago
Supporting developers with natural language queries
The feature list of modern IDEs is steadily growing and mastering these tools becomes more and more demanding, especially for novice programmers. Despite their remarkable capabili...
Michael Würsch, Giacomo Ghezzi, Gerald Reif, ...
139
Voted
CIKM
2010
Springer
15 years 1 months ago
Collaborative future event recommendation
We demonstrate a method for collaborative ranking of future events. Previous work on recommender systems typically relies on feedback on a particular item, such as a movie, and ge...
Einat Minkov, Ben Charrow, Jonathan Ledlie, Seth J...
144
Voted
ICMI
2010
Springer
172views Biometrics» more  ICMI 2010»
15 years 17 days ago
Modelling and analyzing multimodal dyadic interactions using social networks
Social network analysis became a common technique used to model and quantify the properties of social interactions. In this paper, we propose an integrated framework to explore th...
Sergio Escalera, Petia Radeva, Jordi Vitrià...