Sciweavers

2715 search results - page 437 / 543
» An Implementation of Narrowing Strategies
Sort
View
FIW
2007
157views Communications» more  FIW 2007»
13 years 11 months ago
Managing Feature Interaction by Documenting and Enforcing Dependencies in Software Product Lines
Software product line engineering provides a systematic approach for the reuse of software assets in the production of similar software systems. For such it employs different varia...
Roberto Silveira Silva Filho, David F. Redmiles
SEC
2008
13 years 11 months ago
HoneyID : Unveiling Hidden Spywares by Generating Bogus Events
A particular type of spyware which uses the user's events covertly, such as keyloggers and password stealers, has become a big threat to Internet users. Due to the prevalence ...
Jeheon Han, Jonghoon Kwon, Heejo Lee
SIMVIS
2008
13 years 11 months ago
Hybrid Scheduling in the DeVIDE Dataflow Visualisation Environment
Dataflow application builders such as AVS, OpenDX and MeVisLab are popular and effective tools for the rapid prototyping of visualisation algorithms. They enable researchers to bu...
Charl P. Botha, Frits H. Post
PDCN
2007
13 years 11 months ago
One-to-all personalized communication in torus networks
Given a multicomputer system of parallel processors connected in a torus network, the one-to-all personalized communication is to send from the root processor unique data to each ...
Weizhen Mao, Jie Chen, William A. Watson III
RSS
2007
119views Robotics» more  RSS 2007»
13 years 11 months ago
BS-SLAM: Shaping the World
— This paper presents BS-SLAM, a simultaneous localization and mapping algorithm for use in unstructured environments that is effective regardless of whether features correspond ...
Luis Pedraza, Gamini Dissanayake, Jaime Valls Mir&...