Sciweavers

10066 search results - page 1987 / 2014
» A Technique for Information System Integration
Sort
View
SAC
2008
ACM
13 years 7 months ago
Removing useless variables in cost analysis of Java bytecode
Automatic cost analysis has interesting applications in the context of verification and certification of mobile code. For instance, the code receiver can use cost information in o...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
ICRA
2010
IEEE
104views Robotics» more  ICRA 2010»
13 years 6 months ago
Using model knowledge for learning inverse dynamics
— In recent years, learning models from data has become an increasingly interesting tool for robotics, as it allows straightforward and accurate model approximation. However, in ...
Duy Nguyen-Tuong, Jan Peters
VTC
2010
IEEE
153views Communications» more  VTC 2010»
13 years 6 months ago
H.264 Wireless Video Telephony Using Iteratively-Detected Binary Self-Concatenated Coding
— In this contribution we propose a robust H.264 coded wireless video transmission scheme using iteratively decoded self-concatenated convolutional coding (SECCC). The proposed S...
Nasruminallah, Muhammad Fasih Uddin Butt, Soon Xin...
SIGSOFT
2010
ACM
13 years 5 months ago
Software intelligence: the future of mining software engineering data
Mining software engineering data has emerged as a successful research direction over the past decade. In this position paper, we advocate Software Intelligence (SI) as the future ...
Ahmed E. Hassan, Tao Xie
INTERNET
2010
132views more  INTERNET 2010»
13 years 4 months ago
Peer-to-Peer 3D Streaming
In multi-user networked virtual environments such as Second Life, 3D streaming techniques have been used to progressively download and render 3D objects and terrain, so that a ful...
Shun-Yun Hu, Jehn-Ruey Jiang, Bing-Yu Chen
« Prev « First page 1987 / 2014 Last » Next »