Sciweavers

JAIS
2010
98views Algorithms» more  JAIS 2010»
13 years 6 months ago
Code Reuse in Open Source Software Development: Quantitative Evidence, Drivers, and Impediments
The focus of existing open source software (OSS) research has been on how and why individuals and firms add to the commons of public OSS code
Manuel Sojer, Joachim Henkel
JAIS
2010
105views Algorithms» more  JAIS 2010»
13 years 6 months ago
Effects of Interactivity on Website Involvement and Purchase Intention
This study aims to understand how website interactivity (active control and reciprocal communication) can impact purchase intention through website involvement and how the impacts...
Zhenhui Jiang, Jason Chan, Bernard C. Y. Tan, Wei ...
JAIR
2010
90views more  JAIR 2010»
13 years 6 months ago
An Effective Algorithm for and Phase Transitions of the Directed Hamiltonian Cycle Problem
The Hamiltonian cycle problem (HCP) is an important combinatorial problem with applications in many areas. It is among the first problems used for studying intrinsic properties, i...
Gerold Jäger, Weixiong Zhang
JAIR
2010
87views more  JAIR 2010»
13 years 6 months ago
Best-First Heuristic Search for Multicore Machines
Ethan Burns, Sofia Lemons, Wheeler Ruml, Rong Zhou
JAIR
2010
147views more  JAIR 2010»
13 years 6 months ago
Cause Identification from Aviation Safety Incident Reports via Weakly Supervised Semantic Lexicon Construction
The Aviation Safety Reporting System collects voluntarily submitted reports on aviation safety incidents to facilitate research work aiming to reduce such incidents. To effectivel...
Muhammad Arshad Ul Abedin, Vincent Ng, Latifur Kha...
JAIR
2010
130views more  JAIR 2010»
13 years 6 months ago
Interactive Cost Configuration Over Decision Diagrams
In many AI domains such as product configuration, a user should interactively specify a solution that must satisfy a set of constraints. In such scenarios, offline compilation of ...
Henrik Reif Andersen, Tarik Hadzic, David Pisinger
JAIR
2010
181views more  JAIR 2010»
13 years 6 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
JAIHC
2010
88views more  JAIHC 2010»
13 years 6 months ago
SmartEx: a case study on user profiling and adaptation in exhibition booths
Abstract An investigation into user profiling and adaptation with exhibition booth as a case study is reported. First a review of the field of exhibitions and trade fairs and
Ben Salem, Jorge Alves Lino, Matthias Rauterberg
JACM
2010
51views more  JACM 2010»
13 years 6 months ago
XML with incomplete information
Pablo Barceló, Leonid Libkin, Antonella Pog...
JACM
2010
55views more  JACM 2010»
13 years 6 months ago
Newtonian program analysis
Javier Esparza, Stefan Kiefer, Michael Luttenberge...