Sciweavers

1989 search results - page 326 / 398
» Modeling presentation layers of web applications for testing
Sort
View
128
Voted
CSCW
2012
ACM
13 years 11 months ago
Predicting tie strength in a new medium
We have friends we consider very close and acquaintances we barely know. The social sciences use the term tie strength to denote this differential closeness with the people in our...
Eric Gilbert
KDD
2007
ACM
182views Data Mining» more  KDD 2007»
16 years 4 months ago
Cleaning disguised missing data: a heuristic approach
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
129
Voted
UML
2005
Springer
15 years 9 months ago
Specifying Precise Use Cases with Use Case Charts
Use cases are a popular method for capturing and structuring software requirements. The informality of use cases is both a blessing and a curse. It enables easy application and lea...
Jon Whittle
124
Voted
VLDB
2002
ACM
131views Database» more  VLDB 2002»
15 years 3 months ago
ProTDB: Probabilistic Data in XML
Whereas traditional databases manage only deterministic information, many applications that use databases involve uncertain data. This paper presents a Probabilistic Tree Data Bas...
Andrew Nierman, H. V. Jagadish
137
Voted
EUROSYS
2008
ACM
16 years 26 days ago
BorderPatrol: isolating events for black-box tracing
Causal request traces are valuable to developers of large concurrent and distributed applications, yet difficult to obtain. Traces show how a request is processed, and can be anal...
Eric Koskinen, John Jannotti