Recognizing commonly used data structures and algorithms is a key activity in reverse engineering. Systems developed to automate this recognition process have been isolated, stand...
In this paper we present a computational approach to developing effective training systems for virtual simulation environments. In particular, we focus on a Naval simulation syste...
Monica N. Nicolescu, Ryan E. Leigh, Adam Olendersk...
Video recordings of meetings are often monotonous and tedious to watch. In this paper, we report on the design, implementation and evaluation of an automated meeting capture syste...
Abhishek Ranjan, Jeremy P. Birnholtz, Ravin Balakr...
Cloud computing offers users the ability to access large pools of computational and storage resources on demand. Multiple commercial clouds already allow businesses to replace, or...
Very Long Instruction Word (VLIW) architectures exploit instruction level parallelism (ILP) with the help of the compiler to achieve higher instruction throughput with minimal hard...