Sciweavers

401 search results - page 45 / 81
» Software Documents: Comparison and Measurement
Sort
View
SIGIR
2005
ACM
14 years 3 months ago
Do summaries help?
We describe a task-based evaluation to determine whether multi-document summaries measurably improve user performance when using online news browsing systems for directed research...
Kathleen McKeown, Rebecca J. Passonneau, David K. ...
ISESE
2006
IEEE
14 years 3 months ago
PBR vs. checklist: a replication in the n-fold inspection context
Inspection is considered a powerful method to check software documents for defects. Many published work shows that inspections in requirements specification phase are particularly...
Lulu He, Jeffrey C. Carver
DOCENG
2011
ACM
12 years 9 months ago
Contributions to the study of SMS spam filtering: new collection and results
The growth of mobile phone users has lead to a dramatic increasing of SMS spam messages. In practice, fighting mobile phone spam is difficult by several factors, including the lo...
Tiago A. Almeida, José María G&oacut...
ICDM
2008
IEEE
186views Data Mining» more  ICDM 2008»
14 years 4 months ago
xCrawl: A High-Recall Crawling Method for Web Mining
Web Mining Systems exploit the redundancy of data published on the Web to automatically extract information from existing web documents. The first step in the Information Extract...
Kostyantyn M. Shchekotykhin, Dietmar Jannach, Gerh...
ACSAC
2009
IEEE
14 years 4 months ago
The Good, the Bad, And the Ugly: Stepping on the Security Scale
: Metrics are both fashionable and timely: many regulations that affect cybersecurity rely upon metrics – albeit, of the checklist variety in many cases – to ascertain complian...
Mary Ann Davidson