• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 67,587
Next 10 →

Table 2. Experimental results for PADL. Weighted precision and recall of predictions.

in Extracting change-patterns from cvs repositories
by Salah Bouktif, Yann-gaël Guéhéneuc, Giuliano Antoniol 2006
"... In PAGE 8: ... When precision is important a window of more then four or flve changes should be adopted. Table2 reports the weighted averages of the precisions and recalls on PADL, when predicting co-changing flles. The sud- den drop in precision between windows of four and flve changes needs further investigations.... ..."
Cited by 1

Table 1. Distribution of patterns with regards to versions and sizes

in Mining for Co-Changes in the Context of Web Localization
by unknown authors
"... In PAGE 5: ... Evaluation Our approach is evaluated on the document repository of an open source system. Table1 shows a subset of the KDE document repository l10n (localization) that was considered for mining patterns. It gives the number of revisions, the number of (unique) documents involved in the change-sets (i.... In PAGE 6: ...2 - 25 25 5 Table1 shows the distribution of patterns in terms of sizes and versions. This type of information may serve as an indicator as to how many documents are likely to co-change and the estimated number of versions taken to complete the changes in all the co-change documents.... ..."

Table 1. Papers Describing Empirical Studies of Software Project Effort Prediction from IST and JSS (1999-2003)

in Making Software Cost Data Available for Meta-Analysis
by unknown authors
"... In PAGE 3: ...sed the past five years (i.e. 1999 to 2003 inclusive) of the journal Information amp; Software Technology and the Journal of Systems amp; Software. This exercise identified 12 papers (see Table1 ). These concerned a range of different project effort prediction systems ranging from regression models to machine learning techniques such as case-based reasoning and neural nets.... ..."

Table 1. Empirical Studies on Scenarios

in Information Requirements Analysis and Multiple Knowledge Elicitation Techniques: Experience with the Pricing Scenario System
by Dong-gil Ko
"... In PAGE 3: ... There has been limited research in using scenarios in the context of software development [ 9, 11, 19, 21]. As Table1 illustrates, some of the findings from empirical research demonstrate that scenarios provide benefits for eliciting information requirements. Hsia et al.... ..."

Table 2. Classes of contextual information used by sighted and visually impaired participants Class of contextual

in An Experimental Investigation into Wayfinding Directions for Visually Impaired People
by Nicholas A. Bradley, Mark D. Dunlop 2005
"... In PAGE 5: ...2) to investigate differences in how sighted people [31] and visually impaired people [27] use landmarks to navigate. Route descriptions from both studies were categorized, resulting in the eleven classes of contextual information shown in Table2 . The proportion of words/phrases used across the route descriptions of sighted and visually impaired participants are shown for each contextual category.... In PAGE 6: ... Firstly, a researcher in the department who was unknowing of the experiment was asked to walk to each of the landmarks and while doing so verbally describe the environment in relation to the eleven contextual categories. This information was then loosely attributed to each of the conditions by using the proportions in Table2 . For each landmark, an equal number of messages was used for condition one and condition two (on average, this amounted to 15 messages).... ..."
Cited by 4

Table 2. Classes of contextual information used by sighted and visually impaired participants Class of contextual

in An Experimental Investigation into Wayfinding Directions for Visually Impaired People
by Nicholas A. Bradley, Mark D. Dunlop 2005
"... In PAGE 4: ...2) to investigate differences in how sighted people [31] and visually impaired people [27] use landmarks to navigate. Route descriptions from both studies were categorized, resulting in the eleven classes of contextual information shown in Table2 . The proportion of words/phrases used across the route descriptions of sighted and visually impaired participants are shown for each contextual category.... In PAGE 5: ... Firstly, a researcher in the department who was unknowing of the experiment was asked to walk to each of the landmarks and while doing so verbally describe the environment in relation to the eleven contextual categories. This information was then loosely attributed to each of the conditions by using the proportions in Table2 . For each landmark, an equal number of messages was used for condition one and condition two (on average, this amounted to 15 messages).... ..."
Cited by 4

Table 1. Empirical Studies of IT Diffusion

in Information Technology Diffusion: A Review of Empirical Research
by Robert G. Fichman 1992
"... In PAGE 12: ...ndividuals in organizations or organizations as a whole. Similarly to Cooper and Zmud (1990, p. 123) information technology is defined here as any system, product or process whose underlying technology base is composed of computer or communications software or hardware. Figure 2 below maps the eighteen studies to the IT Diffusion Framework; Table1 provides a high-level summary of each study. [INSERT FIGURE 2 THEN TABLE 1 ABOUT HERE] The four subsections below use the IT Diffusion Framework as a device to structure a discussion of major results and implications arising from the eighteen studies.... In PAGE 12: ...1 Individual Adoption of Type 1 Technologies Five studies examined individual adoption or use of Type 1 technologies. The technologies included a text editor, a wordprocessing package, spreadsheet software, graphics software, personal computers and an expert system (see Table1 ). These technologies qualify as independent-use technologies since they were intended to facilitate self- contained tasks performed by individual users.... ..."
Cited by 30

Table 1. Examples of transcriptions and contextual labels.

in A Unified Model of Early Word Learning: Integrating Statistical and Social Cues
by Chen Yu
"... In PAGE 5: ...able 1. Examples of transcriptions and contextual labels. In our experiment, we coded visual contexts to study the role of joint attention. As shown in Table1 , we provided two labels to describe visual contextual information for each spoken utterance. One label indicated the objects of joint attention which were attending by both the mother and the kid.... ..."

Table 1. Examples of transcriptions and contextual labels.

in A Unified Model of Early Word Learning: Integrating Statistical and Social Cues
by Chen Yu
"... In PAGE 5: ...able 1. Examples of transcriptions and contextual labels. In our experiment, we coded visual contexts to study the role of joint attention. As shown in Table1 , we provided two labels to describe visual contextual information for each spoken utterance. One label indicated the objects of joint attention which were attending by both the mother and the kid.... ..."

Table 1. Data collection techniques suitable for field studies of software engineering.

in Studying software engineers: Data collection techniques for software field studies
by Timothy C. Lethbridge, Susan Elliott Sim, Janice Singer 2005
"... In PAGE 2: ...1. A Taxonomy In Table1 , we present a taxonomy for the data collection techniques. Each technique is categorized according to the degree of human contact it requires.... In PAGE 7: ... 3. Survey of Data Collection Methods In this section, we describe the data collection techniques listed in Table1 . We use the taxonomy to organize the presentation of the techniques, beginning with first degree techniques (direct involvement of subjects), moving on to second degree techniques (indirect involvement of subjects), and concluding with third degree techniques (study of work artifacts only).... In PAGE 7: ...1. First Degree Techniques: Direct Involvement of Software Engineers The first five techniques listed in Table1 are what we call inquisitive techniques, while the remaining ones are primarily observational. Each type is appropriate for gathering different types of information from software engineers.... ..."
Cited by 9
Next 10 →
Results 1 - 10 of 67,587
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University