Sciweavers

672 search results - page 99 / 135
» Words and forbidden factors
Sort
View
WWW
2008
ACM
13 years 8 months ago
A Novelty-based Clustering Method for On-line Documents
In this paper, we describe a document clustering method called noveltybased document clustering. This method clusters documents based on similarity and novelty. The method assigns...
Sophoin Khy, Yoshiharu Ishikawa, Hiroyuki Kitagawa
CSUR
2004
91views more  CSUR 2004»
13 years 8 months ago
Line drawing, leap years, and Euclid
Bresenham's algorithm minimizes error in drawing lines on integer grid points; leap year calculations, surprisingly, are a generalization. We compare the two calculations, exp...
Mitchell A. Harris, Edward M. Reingold
DKE
2002
119views more  DKE 2002»
13 years 8 months ago
Enabling the creation of knowledge about software assets
In most companies two factors play a crucial role: managing the knowledge that is necessary for doing business and managing the hardware and software infrastructure that supports ...
Paul Klint, Chris Verhoef
JSS
2000
97views more  JSS 2000»
13 years 8 months ago
Exploring the relationships between design measures and software quality in object-oriented systems
The first goal of this paper is to empirically explore the relationships between existing object-oriented coupling, cohesion, and inheritance measures and the probability of fault...
Lionel C. Briand, Jürgen Wüst, John W. D...
NN
2000
Springer
177views Neural Networks» more  NN 2000»
13 years 8 months ago
Independent component analysis: algorithms and applications
A fundamental problem in neural network research, as well as in many other disciplines, is finding a suitable representation of multivariate data, i.e. random vectors. For reasons...
Aapo Hyvärinen, Erkki Oja