Results 1 - 10
of
67,587
Table 2. Experimental results for PADL. Weighted precision and recall of predictions.
2006
"... In PAGE 8: ... When precision is important a window of more then four or flve changes should be adopted. Table2 reports the weighted averages of the precisions and recalls on PADL, when predicting co-changing flles. The sud- den drop in precision between windows of four and flve changes needs further investigations.... ..."
Cited by 1
Table 1. Distribution of patterns with regards to versions and sizes
"... In PAGE 5: ... Evaluation Our approach is evaluated on the document repository of an open source system. Table1 shows a subset of the KDE document repository l10n (localization) that was considered for mining patterns. It gives the number of revisions, the number of (unique) documents involved in the change-sets (i.... In PAGE 6: ...2 - 25 25 5 Table1 shows the distribution of patterns in terms of sizes and versions. This type of information may serve as an indicator as to how many documents are likely to co-change and the estimated number of versions taken to complete the changes in all the co-change documents.... ..."
Table 1. Papers Describing Empirical Studies of Software Project Effort Prediction from IST and JSS (1999-2003)
"... In PAGE 3: ...sed the past five years (i.e. 1999 to 2003 inclusive) of the journal Information amp; Software Technology and the Journal of Systems amp; Software. This exercise identified 12 papers (see Table1 ). These concerned a range of different project effort prediction systems ranging from regression models to machine learning techniques such as case-based reasoning and neural nets.... ..."
Table 1. Empirical Studies on Scenarios
"... In PAGE 3: ... There has been limited research in using scenarios in the context of software development [ 9, 11, 19, 21]. As Table1 illustrates, some of the findings from empirical research demonstrate that scenarios provide benefits for eliciting information requirements. Hsia et al.... ..."
Table 2. Classes of contextual information used by sighted and visually impaired participants Class of contextual
2005
"... In PAGE 5: ...2) to investigate differences in how sighted people [31] and visually impaired people [27] use landmarks to navigate. Route descriptions from both studies were categorized, resulting in the eleven classes of contextual information shown in Table2 . The proportion of words/phrases used across the route descriptions of sighted and visually impaired participants are shown for each contextual category.... In PAGE 6: ... Firstly, a researcher in the department who was unknowing of the experiment was asked to walk to each of the landmarks and while doing so verbally describe the environment in relation to the eleven contextual categories. This information was then loosely attributed to each of the conditions by using the proportions in Table2 . For each landmark, an equal number of messages was used for condition one and condition two (on average, this amounted to 15 messages).... ..."
Cited by 4
Table 2. Classes of contextual information used by sighted and visually impaired participants Class of contextual
2005
"... In PAGE 4: ...2) to investigate differences in how sighted people [31] and visually impaired people [27] use landmarks to navigate. Route descriptions from both studies were categorized, resulting in the eleven classes of contextual information shown in Table2 . The proportion of words/phrases used across the route descriptions of sighted and visually impaired participants are shown for each contextual category.... In PAGE 5: ... Firstly, a researcher in the department who was unknowing of the experiment was asked to walk to each of the landmarks and while doing so verbally describe the environment in relation to the eleven contextual categories. This information was then loosely attributed to each of the conditions by using the proportions in Table2 . For each landmark, an equal number of messages was used for condition one and condition two (on average, this amounted to 15 messages).... ..."
Cited by 4
Table 1. Empirical Studies of IT Diffusion
1992
"... In PAGE 12: ...ndividuals in organizations or organizations as a whole. Similarly to Cooper and Zmud (1990, p. 123) information technology is defined here as any system, product or process whose underlying technology base is composed of computer or communications software or hardware. Figure 2 below maps the eighteen studies to the IT Diffusion Framework; Table1 provides a high-level summary of each study. [INSERT FIGURE 2 THEN TABLE 1 ABOUT HERE] The four subsections below use the IT Diffusion Framework as a device to structure a discussion of major results and implications arising from the eighteen studies.... In PAGE 12: ...1 Individual Adoption of Type 1 Technologies Five studies examined individual adoption or use of Type 1 technologies. The technologies included a text editor, a wordprocessing package, spreadsheet software, graphics software, personal computers and an expert system (see Table1 ). These technologies qualify as independent-use technologies since they were intended to facilitate self- contained tasks performed by individual users.... ..."
Cited by 30
Table 1. Examples of transcriptions and contextual labels.
"... In PAGE 5: ...able 1. Examples of transcriptions and contextual labels. In our experiment, we coded visual contexts to study the role of joint attention. As shown in Table1 , we provided two labels to describe visual contextual information for each spoken utterance. One label indicated the objects of joint attention which were attending by both the mother and the kid.... ..."
Table 1. Examples of transcriptions and contextual labels.
"... In PAGE 5: ...able 1. Examples of transcriptions and contextual labels. In our experiment, we coded visual contexts to study the role of joint attention. As shown in Table1 , we provided two labels to describe visual contextual information for each spoken utterance. One label indicated the objects of joint attention which were attending by both the mother and the kid.... ..."
Table 1. Data collection techniques suitable for field studies of software engineering.
2005
"... In PAGE 2: ...1. A Taxonomy In Table1 , we present a taxonomy for the data collection techniques. Each technique is categorized according to the degree of human contact it requires.... In PAGE 7: ... 3. Survey of Data Collection Methods In this section, we describe the data collection techniques listed in Table1 . We use the taxonomy to organize the presentation of the techniques, beginning with first degree techniques (direct involvement of subjects), moving on to second degree techniques (indirect involvement of subjects), and concluding with third degree techniques (study of work artifacts only).... In PAGE 7: ...1. First Degree Techniques: Direct Involvement of Software Engineers The first five techniques listed in Table1 are what we call inquisitive techniques, while the remaining ones are primarily observational. Each type is appropriate for gathering different types of information from software engineers.... ..."
Cited by 9
Results 1 - 10
of
67,587