Sciweavers

239 search results - page 17 / 48
» Patterns of co-evolution between requirements and source cod...
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
Optimal Linear Network Coding Design for Secure Unicast with Multiple Streams
—Linear network coding is a promising technology that can maximize the throughput capacity of communication network. Despite this salient feature, there are still many challenges...
Jin Wang, Jianping Wang, Kejie Lu, Bin Xiao, Naiji...
WWW
2008
ACM
14 years 9 months ago
Can chinese web pages be classified with english data source?
As the World Wide Web in China grows rapidly, mining knowledge in Chinese Web pages becomes more and more important. Mining Web information usually relies on the machine learning ...
Xiao Ling, Gui-Rong Xue, Wenyuan Dai, Yun Jiang, Q...
ICSE
2009
IEEE-ACM
14 years 9 months ago
Tesseract: Interactive visual exploration of socio-technical relationships in software development
Software developers have long known that project success requires a robust understanding of both technical and social linkages. However, research has largely considered these inde...
Anita Sarma, Larry Maccherone, Patrick Wagstrom, J...
ICSE
2001
IEEE-ACM
14 years 1 months ago
An Empirical Study of Global Software Development: Distance and Speed
Global software development is rapidly becoming the norm for technology companies. Previous qualitative research suggests that multi-site development may increase development cycl...
James D. Herbsleb, Audris Mockus, Thomas A. Finhol...
AUSDM
2006
Springer
100views Data Mining» more  AUSDM 2006»
14 years 17 days ago
Data Mining Methodological Weaknesses and Suggested Fixes
Predictive accuracy claims should give explicit descriptions of the steps followed, with access to the code used. This allows referees and readers to check for common traps, and t...
John H. Maindonald