Sciweavers

672 search results - page 93 / 135
» An assessment of tag presentation techniques
Sort
View
ICSE
2007
IEEE-ACM
14 years 7 months ago
Tracking Code Clones in Evolving Software
Code clones are generally considered harmful in software development, and the predominant approach is to try to eliminate them through refactoring. However, recent research has pr...
Ekwa Duala-Ekoko, Martin P. Robillard
CCS
2003
ACM
14 years 29 days ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang
ECOOP
1995
Springer
13 years 11 months ago
Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis
Optimizing compilers for object-oriented languages apply static class analysis and other techniques to try to deduce precise information about the possible classes of the receivers...
Jeffrey Dean, David Grove, Craig Chambers
FTCGV
2006
118views more  FTCGV 2006»
13 years 7 months ago
Mesh Parameterization Methods and Their Applications
We present a survey of recent methods for creating piecewise linear mappings between triangulations in 3D and simpler domains such as planar regions, simplicial complexes, and sph...
Alla Sheffer, Emil Praun, Kenneth Rose
SIMPAR
2010
150views Robotics» more  SIMPAR 2010»
13 years 6 months ago
Compliant Robot Actuation by Feedforward Controlled Emulated Spring Stiffness
Abstract. Existing legged robots lack energy-efficiency, performance and adaptivity when confronted with situations that animals cope with on a routine basis. Bridging the gap bet...
Katayon Radkhah, Stefan Kurowski, Thomas Lens, Osk...