Sciweavers

129 search results - page 16 / 26
» Requirements engineering in the year 00: a research perspect...
Sort
View
ICSE
2009
IEEE-ACM
14 years 2 months ago
Mining recurrent activities: Fourier analysis of change events
Within the field of software repository mining, it is common practice to extract change-events from source control systems and then abstract these events to allow for different a...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
HPDC
1998
IEEE
13 years 12 months ago
Personal Tele-Immersion Devices
The Electronic Visualization Laboratory (EVL) at the University of Illinois at Chicago (UIC) has partnered with dozens of computational scientists and engineers to create visualiz...
Thomas A. DeFanti, Daniel J. Sandin, Gregory Dawe,...
CACM
2007
164views more  CACM 2007»
13 years 7 months ago
Is abstraction the key to computing?
ACTION THE KEY TO COMPUTING? Why is it that some software engineers and computer scientists are able to produce clear, elegant designs and programs, while others cannot? Is it poss...
Jeff Kramer
IJCSA
2006
138views more  IJCSA 2006»
13 years 7 months ago
An Integrated System for Cancer-Related Genes Mining from Biomedical Literatures
According to statistics, the rate of having cancer is relatively high for people in developing and developed countries. So cancer can be called as the enemy of human health. With ...
Shih-Nung Chen, Kuo-Cheng Wen
COMSUR
2011
196views Hardware» more  COMSUR 2011»
12 years 7 months ago
From MANET To IETF ROLL Standardization: A Paradigm Shift in WSN Routing Protocols
—In large networks, a data source may not reach the intended sink in a single hop, thereby requiring the traffic to be routed via multiple hops. An optimized choice of such rout...
Thomas Watteyne, Antonella Molinaro, Maria Grazia ...