Sciweavers

634 search results - page 21 / 127
» On the history of evaluation in IR
Sort
View
CORR
2002
Springer
93views Education» more  CORR 2002»
13 years 7 months ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker
ICSE
2007
IEEE-ACM
14 years 7 months ago
Predicting Faults from Cached History
We analyze the version history of 7 software systems to predict the most fault prone entities and files. The basic assumption is that faults do not occur in isolation, but rather ...
Sunghun Kim, Thomas Zimmermann, E. James Whitehead...
KBSE
2007
IEEE
14 years 1 months ago
Extraction of bug localization benchmarks from history
Researchers have proposed a number of tools for automatic bug localization. Given a program and a description of the failure, such tools pinpoint a set of statements that are most...
Valentin Dallmeier, Thomas Zimmermann
LREC
2010
156views Education» more  LREC 2010»
13 years 9 months ago
Estimation Method of User Satisfaction Using N-gram-based Dialog History Model for Spoken Dialog System
In this paper, we propose an estimation method of user satisfaction for a spoken dialog system using an N-gram-based dialog history model. We have collected a large amount of spok...
Sunao Hara, Norihide Kitaoka, Kazuya Takeda
LREC
2010
115views Education» more  LREC 2010»
13 years 5 months ago
Mining Naturally-occurring Corrections and Paraphrases from Wikipedia's Revision History
Naturally-occurring instances of linguistic phenomena are important both for training and for evaluating automatic text processing. When available in large quantities, they also p...
Aurélien Max, Guillaume Wisniewski