Sciweavers

2200 search results - page 353 / 440
» The Generalized Pignistic Transformation
Sort
View
ICSE
1995
IEEE-ACM
14 years 24 days ago
Reverse Engineering of Legacy Code Exposed
— Reverse engineering of large legacy software systems generally cannot meet its objectives because it cannot be cost-effective. There are two main reasons for this. First, it is...
Bruce W. Weide, Wayne D. Heym, Joseph E. Hollingsw...
TAPSOFT
1991
Springer
14 years 23 days ago
Comparative Semantics for a Real-Time Programming Language with Integration
An operational and a denotational semantic model are presented for a real-time programming language incorporating the concept of integration. This concept of integration, which ha...
Franck van Breugel
CHI
2010
ACM
14 years 17 days ago
Across boundaries of influence and accountability: the multiple scales of public sector information systems
The use of ICTs in the public sector has long been touted for its potential to transform the institutions that govern and provide social services. The focus, however, has largely ...
Christopher A. Le Dantec, W. Keith Edwards
CICLING
2010
Springer
14 years 17 days ago
Adaptive Term Weighting through Stochastic Optimization
Term weighting strongly influences the performance of text mining and information retrieval approaches. Usually term weights are determined through statistical estimates based on s...
Michael Granitzer
AVI
2008
13 years 11 months ago
End-user visualizations
Computer visualization has advanced dramatically over the last few years, partially driven by the exploding video game market. 3D hardware acceleration has reached the point where...
Alexander Repenning, Andri Ioannidou