We show how a series of transformations can be applied to a sequential program to obtain programs that represent successive steps in exploiting parallelism in the original algorit...
Lei Pan, Wenhui Zhang, Arthur Asuncion, Ming Kin L...
There can be no doubt that risk management is an important activity in the software engineering area. One proof of this is the large body of work existing in this area. However, w...
We have proposed a metaphor “DAnger Susceptible daTa codON” (DASTON) in data subject to processing by Danger Theory (DT) based Artificial Immune System (DAIS). The DASTONs are ...
For haptic devices, compensation of the robot's gravity is a frequent strategy with the aim to reduce interaction forces between robot and human in zero-impedance control. How...
Heike Vallery, Alexander Duschau-Wicke, Robert Rie...
the title of a report to view the full citation and abstract. s of these reports are available now 169 unique articles this week Age: Adolescents A closer look at co-rumination: Ge...
Christopher A. Naun, Cody S. Olsen, J. Michael Dea...