Sciweavers

446 search results - page 56 / 90
» An approach to safe object sharing
Sort
View
ICMI
2010
Springer
217views Biometrics» more  ICMI 2010»
13 years 6 months ago
Focusing computational visual attention in multi-modal human-robot interaction
Identifying verbally and non-verbally referred-to objects is an important aspect of human-robot interaction. Most importantly, it is essential to achieve a joint focus of attentio...
Boris Schauerte, Gernot A. Fink
MODELS
2009
Springer
14 years 3 months ago
Generic Model Refactorings
Many modeling languages share some common concepts and principles. For example, Java, MOF, and UML share some aspects of the concepts of classes, methods, attributes, and inheritan...
Naouel Moha, Vincent Mahé, Olivier Barais, ...
WWW
2006
ACM
14 years 9 months ago
Selective early request termination for busy internet services
Internet traffic is bursty and network servers are often overloaded with surprising events or abnormal client request patterns. This paper studies a load shedding mechanism called...
Jingyu Zhou, Tao Yang
POPL
2010
ACM
14 years 6 months ago
Static Determination of Quantitative Resource Usage for Higher-Order Programs
We describe a new automatic static analysis for determining upper-bound functions on the use of quantitative resources for strict, higher-order, polymorphic, recursive programs de...
Steffen Jost, Hans-Wolfgang Loidl, Kevin Hammond, ...
CC
2006
Springer
122views System Software» more  CC 2006»
14 years 15 days ago
Context-Sensitive Points-to Analysis: Is It Worth It?
We present the results of an empirical study evaluating the precision of subset-based points-to analysis with several variations of context sensitivity on Java benchmarks of signif...
Ondrej Lhoták, Laurie J. Hendren