Search For:

Displaying 1-50 out of 697 total
Keynote: Jane McGonigal
Found in: ACM Transactions on Graphics (TOG)
By Jane McGonigal
Issue Date:July 2012
pp. 1-10
We propose a complete process for designing, simulating, and fabricating synthetic skin for an animatronics character that mimics the face of a given subject and its expressions. The process starts with measuring the elastic properties of a material used t...
     
Interleaving Delaunay refinement and optimization for practical isotropic tetrahedron mesh generation
Found in: ACM Transactions on Graphics (TOG)
By Camille Wormser, Jane Tournois, Mathieu Desbrun, Pierre Alliez, Camille Wormser, Jane Tournois, Mathieu Desbrun, Pierre Alliez, Camille Wormser, Jane Tournois, Mathieu Desbrun, Pierre Alliez, Camille Wormser, Jane Tournois, Mathieu Desbrun, Pierre Alliez
Issue Date:July 2009
pp. 1-2
We present a practical approach to isotropic tetrahedral meshing of 3D domains bounded by piecewise smooth surfaces. Building upon recent theoretical and practical advances, our algorithm interleaves Delaunay refinement and mesh optimization to generate qu...
     
Automated support for managing feature requests in open forums
Found in: Communications of the ACM
By Carlos Castro-Herrera, Chuan Duan, Chuan Duan, Chuan Duan, Horatiu Dumitru, Horatiu Dumitru, Horatiu Dumitru, Jane Cleland-Huang, Jane Cleland-Huang, Jane Cleland-Huang
Issue Date:October 2009
pp. 68-74
The result is stable, focused, dynamic discussion threads that avoid redundant ideas and engage thousands of stakeholders.
     
Using tracelab to design, execute, and baseline empirical requirements engineering experiments
Found in: 2013 IEEE 21st International Requirements Engineering Conference (RE)
By Jane Cleland-Huang,Adam Czauderna,Jane Huffman Hayes
Issue Date:July 2013
pp. 338-339
As Requirements Engineering research continues to grow into a mature and rigorous discipline, an increasing focus is placed on the need for sound evaluation techniques that compare the benefits of a new solution against existing ones. In this tool demonstr...
   
Grand challenges, benchmarks, and tracelab: developing infrastructure for the software traceability community
Found in: Proceeding of the 6th international workshop on Traceability in emerging forms of software engineering (TEFSE '11)
By Adam Czauderna, Alex Dekhtyar, Alexander Egyed, Andrea Zisman, Brian Berenbach, Denys Poshyvanyk, Ed Keenan, Giuliano Antoniol, Greg Leach, Jane Cleland-Huang, Jane Huffman Hayes, Jonathan Maletic, Olly Gotel, Patrick Maeder, Youghee Shin
Issue Date:May 2011
pp. 17-23
The challenges of implementing successful and cost-effective traceability have created a compelling research agenda that has addressed a broad range of traceability related issues, ranging from qualitative studies of traceability users in industry to very ...
     
Working Smarter in Terra Nova Circa 2015
Found in: eLearn
By Charles Jennings, Clark Quinn, Harold Jarche, Jane Hart, Jay Cross, Jon Husband, Charles Jennings, Clark Quinn, Harold Jarche, Jane Hart, Jay Cross, Jon Husband
Issue Date:September 2010
pp. 23-23
In an exclusive eLearn Magazine article, an e-learning all star team of authors defines the new learning age, approaching in the next 2 to 5 years: Terra Nova! Unlike the industrial age, when workers were told they were not paid to think, or the informatio...
     
Model-based traceability
Found in: Traceability in Emerging Forms of Software Engineering, ICSE Workshop on
By Jane Cleland-Huang, Jane Huffman Hayes, J. M. Domel
Issue Date:May 2009
pp. 6-10
Many organizations invest considerable cost and effort in building traceability matrices in order to comply with regulatory requirements or process improvement initiatives. Unfortunately, these matrices are frequently left un-used and project stakeholders ...
 
3rd international workshop on traceability in emerging forms of software engineering (TEFSE 2005)
Found in: Proceedings of the 20th IEEE/ACM international Conference on Automated software engineering (ASE '05)
By Giuliano Antoniol, Jane Cleland-Huang, Jane Huffman Hayes, Jonathan I. Maletic
Issue Date:November 2005
pp. 462-462
Establishing and maintaining traceability links and consistency between software artifacts produced or modified in the software life-cycle are costly and tedious activities that are crucial but frequently neglected in practice. Traceability between the fre...
     
Adaptive Fuzzy Consensus Clustering Framework for Clustering Analysis of Cancer Data
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Zhiwen Yu,Hantao Chen,Jane You,Jiming Liu,Hau-San Wong,Guoqiang Han,Le Li
Issue Date:February 2015
pp. 1
Performing clustering analysis is one of the important research topics in cancer discovery using gene expression profiles, which is crucial in facilitating the successful diagnosis and treatment of cancer. While there are quite a number of research works w...
 
Double Selection Based Semi-Supervised Clustering Ensemble for Tumor Clustering from Gene Expression Profiles
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Zhiwen Yu,Hongsheng Chen,Jane You,Hau-San Wong,Jiming Liu,Le Li,Guoqiang Han
Issue Date:July 2014
pp. 1-1
Tumor clustering is one of the important techniques for tumor discovery from cancer gene expression profiles, which is useful for the diagnosis and treatment of cancer. While different algorithms have been proposed for tumor clustering, few make use of the...
 
How Well Do You Know Your Personae Non Gratae?
Found in: IEEE Software
By Jane Cleland-Huang
Issue Date:July 2014
pp. 28-31
Imagine that you're building a software system that collects healthcare data and financial information from its users. It might seem obvious that this personal information should be protected from prying eyes through access control mechanisms, audit trails...
   
Validation of Software Testing Experiments: A Meta-Analysis of ICST 2013
Found in: 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation (ICST)
By Mark Hays,Jane Huffman Hayes,Arne C. Bathke
Issue Date:March 2014
pp. 333-342
Researchers in software testing are often faced with the following problem of empirical validation: does a new testing technique actually help analysts find more faults than some baseline method? Researchers evaluate their contribution using statistics to ...
 
Understanding NSF funding
Found in: Proceedings of the 45th ACM technical symposium on Computer science education (SIGCSE '14)
By Harriet Taylor, Jan Cuny, Jane Prey, Jeffrey Forbes, Paul Tymann, Valerie Barr, Victor Piotrowski
Issue Date:March 2014
pp. 83-84
This session will provide information about the current status of Federal budget as it impacts NSF and the computing community. Representatives from both Education and Human Resources (EHR) and Computer and Information Science and Engineering (CISE) direct...
     
Curriculum is not enough: the educational theory and research foundation of the exploring computer science professional development model
Found in: Proceedings of the 45th ACM technical symposium on Computer science education (SIGCSE '14)
By Gail Chapman, Jane Margolis, Joanna Goode
Issue Date:March 2014
pp. 493-498
In recent years, the computer science education community has shown strong commitment to broadening participation in computing in K-12 classrooms. Educational research highlights the critical role of professional development in supporting teachers to attra...
     
Don't Fire the Architect! Where Were the Requirements?
Found in: IEEE Software
By Jane Cleland-Huang
Issue Date:March 2014
pp. 27-29
The Healthcare.gov debacle of 2013 leads many to wonder if a better understanding of the project's requirements could have lessened the impact of the failed launch. The Web extra at http://youtu.be/qyQldlPz1ws is an audio podcast of author Jane Cleland-Hua...
 
A study on the implementation of large-scale home telemonitoring service
Found in: Proceedings of the companion publication of the 17th ACM conference on Computer supported cooperative work & social computing (CSCW Companion '14)
By Branko Celler, Jane Li, Leila Alem, Marlien Varnfield
Issue Date:February 2014
pp. 193-196
We present the early findings from a longitudinal study of a multi-site home telemonitoring program for chronic disease management. The study aims to find out how the telehealth service is integrated into existing models of care at each site and how it imp...
     
NetkAT: semantic foundations for networks
Found in: Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL '14)
By Arjun Guha, Carolyn Jane Anderson, Cole Schlesinger, David Walker, Dexter Kozen, Jean-Baptiste Jeannin, Nate Foster
Issue Date:January 2014
pp. 113-126
Recent years have seen growing interest in high-level languages for programming networks. But the design of these languages has been largely ad hoc, driven more by the needs of applications and the capabilities of network hardware than by foundational prin...
     
Predicting Petroleum Reservoir Properties from Downhole Sensor Data using an Ensemble Model of Neural Networks
Found in: Proceedings of Workshop on Machine Learning for Sensory Data Analysis (MLSDA '13)
By Abdulazeez Abdulraheem, Fatai Anifowose, Jane Labadin
Issue Date:December 2013
pp. 27-34
The acquisition of huge sensor data has led to the advent of the smart field phenomenon in the petroleum industry. A lot of data is acquired during drilling and production processes through logging tools equipped with sub-surface/down-hole sensors. Reservo...
     
An Adaptive Descriptor Design for Object Recognition in the Wild
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Zhenyu Guo,Z. Jane Wang
Issue Date:December 2013
pp. 2568-2575
Digital images nowadays show large appearance variabilities on picture styles, in terms of color tone, contrast, vignetting, and etc. These `picture styles' are directly related to the scene radiance, image pipeline of the camera, and post processing funct...
 
Supporting Domain Analysis through Mining and Recommending Features from Online Product Listings
Found in: IEEE Transactions on Software Engineering
By Negar Hariri,Carlos Castro-Herrera,Mehdi Mirakhorli,Jane Cleland-Huang,Bamshad Mobasher
Issue Date:December 2013
pp. 1736-1752
Domain analysis is a labor-intensive task in which related software systems are analyzed to discover their common and variable parts. Many software projects include extensive domain analysis activities, intended to jumpstart the requirements process throug...
 
Reliability Enhancement of Flash-Memory Storage Systems: An Efficient Version-Based Design
Found in: IEEE Transactions on Computers
By Yuan-Hao Chang,Po-Chun Huang,Pei-Han Hsu,Lue-Jane Lee,Tei-Wei Kuo,David Hung-Chang Du
Issue Date:December 2013
pp. 2503-2515
In recent years, reliability has become one critical issue in the designs of flash-memory file/storage systems, due to the growing unreliability of advanced flash-memory chips. In this paper, a version-based design is proposed to effectively and efficientl...
 
Documenting and sharing comparative analyses of 3D digital museum artifacts through semantic web annotations
Found in: Journal on Computing and Cultural Heritage (JOCCH)
By Chih-Hao Yu, Jane Hunter
Issue Date:November 2013
pp. 1-20
Understanding the similarities, differences, and relationships between cultural heritage artifacts is critical for determining their significance and their provenance. It also provides valuable information for ensuring the long-term preservation of cultura...
     
Requirements Engineering's Next Top Model
Found in: IEEE Software
By Olly Gotel,Jane Cleland-Huang
Issue Date:November 2013
pp. 24-29
A game-show environment let a panel competitively explore the use of various requirements modeling techniques for specifying a complex problem. Although plain old text and rich pictures emerged as the winners, real-world problems are best modeled using a v...
 
An Interdisciplinary Approach to Educating an Effective Cyber Security Workforce
Found in: Proceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development Conference (InfoSecCD '13)
By Jane LeClair, Sherly Abraham, Lifang Shih
Issue Date:October 2013
pp. 71-78
Organizations and communities are now increasingly dependent on computer networks for their daily operations, which makes the digital world both attractive and lucrative for cyber criminals. Additionally, the volume of banking and monetary transactions tha...
     
OzTrack -- E-Infrastructure to Support the Management, Analysis and Sharing of Animal Tracking Data
Found in: 2013 IEEE 9th International Conference on eScience (eScience)
By Jane Hunter,Charles Brooking,Wilfred Brimblecombe,Ross G. Dwyer,Hamish A. Campbell,Matthew E. Watts,Craig E. Franklin
Issue Date:October 2013
pp. 140-147
The aim of the OzTrack project is to provide common e-Science infrastructure to support the management, pre-processing, analysis and visualization of animal tracking data generated by researchers who are using telemetry devices to study animal behavior and...
 
Immersive FPS games: user experience and performance
Found in: Proceedings of the 2013 ACM international workshop on Immersive media experiences (ImmersiveMe '13)
By Fred Charles, Jane Lessiter, Jean-Luc Lugrin, Jonathan Freeman, Marc Cavazza, Marc Le Renard
Issue Date:October 2013
pp. 7-12
Computer games are ideally placed to form the content of future Immersive Media, but this prospect is faced with both technical and usability issues. This paper describes an experiment in immersive gaming using a state-of-the-art computer First Person Shoo...
     
Alicia Sanchez: A review of recent games research
Found in: eLearn
By Jane Bozarth
Issue Date:September 2013
pp. 251-260
Alicia Sanchez is a regular fixture at conferences where she presents highlights and key findings on current research related to gaming and online learning. Collected in this overview are six studies that address the characteristics of and impact of games....
     
Designing for depth: underwater play
Found in: Proceedings of The 9th Australasian Conference on Interactive Entertainment: Matters of Life and Death (IE '13)
By Florian 'Floyd' Mueller, Sarah Jane Pell
Issue Date:September 2013
pp. 1-6
The underwater domain is an alluring 'other world', inviting of human-aquatic interactivity and bodily play and yet it is also an extreme environment as it is inhospitable to support human life without external air-supply. Playful interactions are therefor...
     
ACM NDC study: a new annual study of non-doctoral-granting departments in computing
Found in: ACM Inroads
By Jane Chu Prey, Jodi L. Tims, Stuart Zweben, Yan Timanovsky
Issue Date:September 2013
pp. 4-14
Hello, and welcome to Spotlight, an ongoing section that highlights and reflects the current trends within computing education. The computing-education community is composed of many Special Interest Groups under the ACM umbrella. One of the largest ACM Spe...
     
Thinking about Quoins: Strategic Traceability of Architecturally Significant Requirements
Found in: IEEE Software
By Jane Cleland-Huang
Issue Date:September 2013
pp. 16-18
Architectural degradation is a common problem in most nontrivial, long-lived software systems. By identifying architecturally significant requirements and establishing trace links from those requirements, via architectural decisions, to code, we can keep d...
 
Reshaping cache misses to improve row-buffer locality in multicore systems
Found in: 2013 22nd International Conference on Parallel Architectures and Compilation Techniques (PACT)
By Wei Ding,Jun Liu,Mahmut Kandemir,Mary Jane Irwin
Issue Date:September 2013
pp. 235-244
Optimizing cache locality has always been important since the emergence of caches, and numerous cache locality optimization schemes have been published in compiler literature. However, in modern architectures, cache locality is not the only factor that det...
   
Demand-driven power saving by multiagent negotiation for HVAC control
Found in: Joint Proceedings of the Workshop on AI Problems and Approaches for Intelligent Environments and Workshop on Semantic Cities (AIIP '13)
By Jane Yung-jen Hsu, Yi-ting Tsao
Issue Date:August 2013
pp. 9-14
Buildings account for roughly 40% of all U.S. energy use, and HVAC systems are a major culprit. The goal of this research is to reduce power consumption without sacrificing human comfort. This paper presents a cooling demand estimation from heat generation...
     
Characterisation of movement disorder in parkinson's disease using evolutionary algorithms
Found in: Proceeding of the fifteenth annual conference companion on Genetic and evolutionary computation conference companion (GECCO '13 Companion)
By D.R. Stuart Jamieson, Jane E. Alty, Katherine L. Possin, Michael A. Lones, Norbert Schuff, Stephen L. Smith, Stuart E. Lacy
Issue Date:July 2013
pp. 1479-1486
Parkinson's Disease is a devastating illness with no currently available cure. As the population ages, the disease becomes more common with a large financial cost to society. A rapid and accurate diagnosis, as well as practical monitoring methods are essen...
     
Meet Elaine: A Persona-Driven Approach to Exploring Architecturally Significant Requirements
Found in: IEEE Software
By Jane Cleland-Huang
Issue Date:July 2013
pp. 18-21
Software-intensive projects are driven by quality concerns; however, these can be difficult to elicit and manage in early stages of a project. Architecturally savvy personas provide a tangible approach for capturing performance, reliability, security, and ...
 
Developing a Novel Approach for 3D Visualisation of Tarland
Found in: 2013 17th International Conference on Information Visualisation
By Chen Wang,David Miller,Yang Jiang,Jane Morrice
Issue Date:July 2013
pp. 499-504
The objective of this paper is to report on the development of prototype models for use in raising public awareness of changes in rural areas, focusing on green spaces, and testing responses to scenarios of change. Specifically, the focus is on the design ...
 
Application of reinforcement learning to requirements engineering: requirements tracing
Found in: 2013 IEEE 21st International Requirements Engineering Conference (RE)
By Hakim Sultanov,Jane Huffman Hayes
Issue Date:July 2013
pp. 52-61
We posit that machine learning can be applied to effectively address requirements engineering problems. Specifically, we present a requirements traceability method based on the machine learning technique Reinforcement Learning (RL). The RL method demonstra...
   
Foundations for an expert system in domain-specific traceability
Found in: 2013 IEEE 21st International Requirements Engineering Conference (RE)
By Jin Guo,Jane Cleland-Huang,Brian Berenbach
Issue Date:July 2013
pp. 42-51
Attempts to utilize information retrieval techniques to fully automate the creation of traceability links have been hindered by terminology mismatches between source and target artifacts. Therefore, current trace retrieval algorithms tend to produce imprec...
   
Ready-Set-Transfer: Technology transfer in the requirements engineering domain
Found in: 2013 IEEE 21st International Requirements Engineering Conference (RE)
By Jane Cleland-Huang,Smita Ghaisas
Issue Date:July 2013
pp. 345-346
Requirements engineering research is undertaken to propose innovative solutions, to develop concepts, algorithms, processes, and technologies, to validate effective solutions for important requirements-related problems, and ultimately to support the transi...
   
The creative personality: composers of music, their inspirations and working methods
Found in: Proceedings of the 9th ACM Conference on Creativity & Cognition (C&C '13)
By Jane Davidson, Sandra Garrido, Sean Bernard
Issue Date:June 2013
pp. 308-311
The stereotypical image that many people would picture when they think of a composer is that of the classical musician like Beethoven who was reportedly an introvert, moody and angst-ridden. However, findings in relation to personality traits that correlat...
     
Modeling and architecture design of an MDPnP acute care monitoring system
Found in: 2013 IEEE 26th International Symposium on Computer-Based Medical Systems (CBMS)
By Maryam Rahmaniheris,Woochul Kang,Lue-Jane Lee,Lui Sha,Richard B. Berlin,Julian M. Goldman
Issue Date:June 2013
pp. 514-515
Medical Device Plug-and-Play (MDPnP) permits the mitigation of preventable medical errors. However, MDPnP results in a dynamic environment, which presents great challenges to traditional software architectures. This paper addresses these challenges by desc...
   
Hybrid Fuzzy Cluster Ensemble Framework for Tumor Clustering from Biomolecular Data
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
By Guoqiang Han, Hantao Chen, Zhiwen Yu, Jane You, Le Li
Issue Date:May 2013
pp. 657-670
Cancer class discovery using biomolecular data is one of the most important tasks for cancer diagnosis and treatment. Tumor clustering from gene expression data provides a new way to perform cancer class discovery. Most of the existing research works adopt...
     
Hybrid Fuzzy Cluster Ensemble Framework for Tumor Clustering from Bio-molecular Data
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Zhiwen Yu,Hantao Chen,Jane You,Guoqiang Han,Le Li
Issue Date:May 2013
pp. 1
In order to further improve the performance of tumor clustering from bio-molecular data, we introduce the fuzzy theory into the cluster ensemble framework for tumor clustering from bio-molecular data, and propose four kinds of hybrid fuzzy cluster ensemble...
 
A General Performance Evaluation Framework for Network Selection Strategies in 3G-WLAN Interworking Networks
Found in: IEEE Transactions on Mobile Computing
By Hao Wang,David I. Laurenson,Jane Hillston
Issue Date:May 2013
pp. 868-884
In this work, we investigate a general performance evaluation framework for network selection strategies (NSSs) that are used in 3G-WLAN interworking networks. Instead of simulation, this framework is based on models of NSSs and is constructed using a stoc...
 
Strategic Traceability for Safety-Critical Projects
Found in: IEEE Software
By Patrick Mader,Paul L. Jones,Yi Zhang,Jane Cleland-Huang
Issue Date:May 2013
pp. 58-66
To support any claim that a product is safe for its intended use, manufacturers must establish traceability within that product's development life cycle. Unfortunately, traceability information submitted to regulators and third parties is often weak, casti...
 
Are Requirements Alive and Kicking?
Found in: IEEE Software
By Jane Cleland-Huang
Issue Date:May 2013
pp. 13-15
The importance of discovering and understanding stakeholders' needs and delivering quality products that meet those needs is timeless. Nevertheless, dramatic changes in the IT environment over the past decade have introduced challenges that demand new and ...
 
REquirements TRacing On target (RETRO) enhanced with an automated thesaurus builder: An empirical study
Found in: 2013 International Workshop on Traceability in Emerging Forms of Software Engineering (TEFSE)
By Sandeep Pandanaboyana,Shreeram Sridharan,Jesse Yannelli,Jane Huffman Hayes
Issue Date:May 2013
pp. 61-67
Several techniques have been proposed to increase the performance of the tracing process, including use of a thesaurus. Some thesauri pre-exist and have been shown to improve the recall for some datasets. But the drawback is that they are manually generate...
   
Trace Matrix Analyzer (TMA)
Found in: 2013 International Workshop on Traceability in Emerging Forms of Software Engineering (TEFSE)
By Wenbin Li,Jane Huffman Hayes,Fan Yang,Ken Imai,Jesse Yannelli,Chase Carnes,Maureen Doyle
Issue Date:May 2013
pp. 44-50
A Trace Matrix (TM) represents the relationship between software engineering artifacts and is foundational for many software assurance techniques such as criticality analysis. In a large project, a TM might represent the relationships between thousands of ...
   
Ontology-based trace retrieval
Found in: 2013 International Workshop on Traceability in Emerging Forms of Software Engineering (TEFSE)
By Yonghua Li,Jane Cleland-Huang
Issue Date:May 2013
pp. 30-36
In automated requirements trace retrieval, an ontology can be used as an intermediary artifact to identify relationships that would not be recognized by standard information retrieval techniques. However, ontologies must be carefully constructed to fit the...
   
Trace-by-classification: A machine learning approach to generate trace links for frequently occurring software artifacts
Found in: 2013 International Workshop on Traceability in Emerging Forms of Software Engineering (TEFSE)
By Mateusz Wieloch,Sorawit Amornborvornwong,Jane Cleland-Huang
Issue Date:May 2013
pp. 110-114
Over the past decade the traceability research community has focused upon developing and improving trace retrieval techniques in order to retrieve trace links between a source artifact, such as a requirement, and set of target artifacts, such as a set of j...
   
Traceability Challenge 2013: Query+ enhancement for semantic tracing (QuEST): Software verification and validation research laboratory (SVVRL) of the University of Kentucky
Found in: 2013 International Workshop on Traceability in Emerging Forms of Software Engineering (TEFSE)
By Wenbin Li,Jane Huffman Hayes
Issue Date:May 2013
pp. 95-99
We present the process and methods applied in undertaking the Traceability Challenge in addressing the Ubiquitous Grand Challenge, Research Project 3. Terms contained within queries (along with document collection terms, hence the “+”) have been enhanced t...
   
 1  2 Next >>