• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 114
Next 10 →

ISP-OPL – ISO-based Software Process OPL An Ontology Pattern Language for modeling Software Processes in the context of ISO SC7.

by unknown authors
"... An Ontology Pattern Language (OPL) [1] aims to provide holistic support for using Domain-related Ontology Patterns (DROPs) in ontology development for a specific application domain. It provides explicit guidance on what problems can arise in that domain, informs the order to address these problems, ..."
Abstract - Add to MetaCart
Resources, dealing with how people are organized in teams, allocated to tasks and perform work units. The patterns composing the language were based on an Ontological Analysis of ISO/IEC 24744 [2] and some of them imported and adapted from SP-OPL [1] and E-OPL [3]. Table 1 presents the patterns that compose

A terminology data bank for translators: methods of interrogation in the TEAM system. In: Overcoming the language barrier (ref

by J Schulz
"... Abstract The TEAM system was developed in the Language Services Department of Siemens in Munich. The core of the system, which is intended to provide machine aids to translation, is a multilingual terminology data bank, in which information of different nature, origin and quality is stored and proc ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
on the basis of a subject key index. (In the TEAM system, this index is based essentially on a polyhierarchical classification and can be broken down to a maximum of (at present) four decimal places. The subject reference can also be given in an uncoded form, for example, in a mnemonic, abbreviated form

An Evaluation of Inquiry-Based Requirements Analysis for an Internet Service 1

by Colin Potts A, Kenji Takahashi B, Jeffrey Smith B, Kenji Ota B
"... The Inquiry Cycle is a generic process model for conducting requirements elaboration. It consists of three activities: requirements expression, discussion and commitment. This paper describes an evaluation of the Inquiry Cycle model and a support tool, Tuiqiao, in the requirements analysis phase of ..."
Abstract - Add to MetaCart
on patterns of collaboration among the team members are analyzed. The project gradually shifted from synchronous meetings to asynchronous and individual work patterns. A shift also occurred from an emphasis on discussion to an emphasis on commitment and expression. The requirements elaboration process

1Link Estimation and Routing in Sensor Network Backbones: Beacon-based or Data-driven?

by Hongwei Zhang, Anish Arora, Senior Member, Prasun Sinha
"... Abstract — In the context of IEEE 802.11b network testbeds, we examine the differences between unicast and broadcast link properties, and we show the inherent difficulties in precisely estimating unicast link properties via those of broadcast beacons even if we make the length and transmission rate ..."
Abstract - Add to MetaCart
based on ETX/ETT-type metrics, but the metrics are estimated via MAC feedback for unicast data transmission instead of broadcast beacons. Using a realistic sensor network traffic trace and an 802.11b testbed of ∼195 Stargates, we experimentally compare the performance of LOF with that of beacon-based

Collaborative Duet of Friction and Traction: When the Academia Rubber Hits the Industrial Road

by Ethan Hadar, Irit Hadar
"... There is no argument that theoretical reasoning, as captured in scientific papers, may be of great value for industry. Typical ex-amples in our field include refactoring methods, software engi-neering process methods, Object Oriented Design techniques and patterns and much more. However, industrial ..."
Abstract - Add to MetaCart
There is no argument that theoretical reasoning, as captured in scientific papers, may be of great value for industry. Typical ex-amples in our field include refactoring methods, software engi-neering process methods, Object Oriented Design techniques and patterns and much more. However, industrial

Abstracts

by Ursula Stickler, Carolyn Batstone, Annette Duensing, Barbara Heins, Distance Learning, Language Tutorials
"... This paper presents findings from the Interaction Study Group, a team of four researchers based at the Open University (OU) investigating tutorial provision on beginners ' distance language courses. Patterns of verbal interaction in online and telephone tutorials are investigated using social n ..."
Abstract - Add to MetaCart
This paper presents findings from the Interaction Study Group, a team of four researchers based at the Open University (OU) investigating tutorial provision on beginners ' distance language courses. Patterns of verbal interaction in online and telephone tutorials are investigated using social

DOI 10.1007/s00778-012-0302-x SPECIAL ISSUE PAPER Automating the database schema evolution process

by Carlo Curino, Hyun Jin, Moon Alin Deutsch, Carlo Zaniolo, C. Curino (b, H. J. Moon, A. Deutsch, C. Zaniolo
"... Abstract Supporting database schema evolution repre-sents a long-standing challenge of practical and theoretical importance for modern information systems. In this paper, we describe techniques and systems for automating the critical tasks of migrating the database and rewriting the legacy applicati ..."
Abstract - Add to MetaCart
legacy queries and updates under schema and integrity constraints evolution. The PRISM/PRISM++ approach consists in providing the users with a set of SQL-based Schema Modification Opera-tors (SMOs), which describe how the tables in the old schema are modified into those in the new schema. In order to sup

An Analysis of the Effect of Code Ownership on Software Quality across Windows, Eclipse, and Firefox

by Christian Bird, Harald Gall, Brendan Murphy, Premkumar Devanbu
"... Ownership is an important aspect of software development in large software teams. We examine the relationship between a number of ownership measures and software faults/failures in three large software projects drawn from different process domains: Windows Vista, the Eclipse Java IDE, and the Firefo ..."
Abstract - Cited by 5 (2 self) - Add to MetaCart
analysis of Vista to understand patterns of ownership and show its effect on fault prediction models. Finally we provide recommendations for utilization of resources such as code inspections and possible source code change policies based on our results. 1.

A Hands-on Graduate Real-time Control Course: Development and Experience*

by Timothy Chang, Daphne Chang
"... In this paper, the findings based on a graduate electrical engineering course titled `Real-Time Control Systems Design ' are analyzed and reported. This course is comprised of a lecture and laboratory component where the students are expected to transform their theoretical knowledge into a viab ..."
Abstract - Add to MetaCart
in student performance, team success and overall laboratory experience. Based on the combined results, a number of recommendations are brought forth for improving curriculum design and student assessment at the graduate level.

Impacts and Detection of Design Smells

by Abdou Maiga, Esma Aimeur, Yann-Gael Gueheneuc , 2012
"... Changes are continuously made in the source code to take into account the needs of the customers and fix the faults. Continuous change can lead to antipatterns and code smells, collectively called “design smells” to occur in the source code. Design smells are poor solutions to recurring design or im ..."
Abstract - Add to MetaCart
. The obtained results justify a posteriori previous researches on the specification and detection of design smells. Software development teams should warn developers against high number of occurrences of design smells and recommend refactorings at each step of the development to remove them when possible
Next 10 →
Results 11 - 20 of 114
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University