Sciweavers

1744 search results - page 145 / 349
» The Steganographic File System
Sort
View
104
Voted
ICSM
2008
IEEE
15 years 10 months ago
Who can help me with this source code change?
An approach to recommend a ranked list of developers to assist in performing software changes to a particular file is presented. The ranking is based on change expertise, experien...
Huzefa H. Kagdi, Maen Hammad, Jonathan I. Maletic
135
Voted
MSR
2006
ACM
15 years 9 months ago
Mining sequences of changed-files from version histories
Modern source-control systems, such as Subversion, preserve change-sets of files as atomic commits. However, the specific ordering information in which files were changed is typic...
Huzefa H. Kagdi, Shehnaaz Yusuf, Jonathan I. Malet...
134
Voted
MM
2003
ACM
120views Multimedia» more  MM 2003»
15 years 9 months ago
Linking multimedia presentations with their symbolic source documents: algorithm and applications
An algorithm is presented that automatically matches images of presentation slides to the symbolic source file (e.g., PowerPointTM or AcrobatTM ) from which they were generated. T...
Berna Erol, Jonathan J. Hull, Dar-Shyang Lee
152
Voted
NOSSDAV
2009
Springer
15 years 10 months ago
Power efficient real-time disk scheduling
Hard-disk drive power consumption reduction methods focus mainly on increasing the amount of time the disk is in standby mode (disk spun down) by implementing aggressive data read...
Damien Le Moal, Donald Molaro, Jorge Campello
120
Voted
SIGMETRICS
2004
ACM
15 years 9 months ago
Multicast protocols for scalable on-demand download
Previous scalable protocols for downloading large, popular files from a single server include batching and cyclic multicast. With batching, clients wait to begin receiving a reque...
Niklas Carlsson, Derek L. Eager, Mary K. Vernon