Sciweavers

359 search results - page 67 / 72
» A Formal Model of the Process of Wayfinding in Built Environ...
Sort
View
RAS
2000
106views more  RAS 2000»
13 years 7 months ago
Robust localization of auditory and visual targets in a robotic barn owl
In the last two decades, the barn owl, a nocturnal predator with accurate visual and auditory capabilities, has become a common experimental system for neuroscientists investigati...
Michele Rucci, Jonathan Wray, Gerald M. Edelman
ICTAI
2008
IEEE
14 years 1 months ago
Discovering Program's Behavioral Patterns by Inferring Graph-Grammars from Execution Traces
Frequent patterns in program executions represent recurring sequences of events. These patterns can be used to reveal the hidden structures of a program, and ease the comprehensio...
Chunying Zhao, Keven Ates, Jun Kong, Kang Zhang
JIT
2005
Springer
134views Database» more  JIT 2005»
14 years 1 months ago
MAGI - Mobile Access to Grid Infrastructure: Bringing the gifts of Grid to Mobile Computing
: Access to Grid services is currently limited to devices having significant computing, network resources etc. such as desktop computers. On the other hand, most of mobile devices ...
Ali Sajjad, Hassan Jameel, Umar Kalim, Young-Koo L...
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
14 years 12 days ago
Design Experience of a Chip Multiprocessor Merlot and Expectation to Functional Verification
We have fabricated a Chip Multiprocessor prototype code-named Merlot to proof our novel speculative multithreading architecture. On Merlot, multiple threads provide wider issue wi...
Satoshi Matsushita
MOBILITY
2009
ACM
14 years 4 days ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...