Sciweavers

1096 search results - page 35 / 220
» Computation Slicing: Techniques and Theory
Sort
View
SMA
2008
ACM
192views Solid Modeling» more  SMA 2008»
13 years 6 months ago
Identification of sections from engineering drawings based on evidence theory
View identification is the basal process for solid reconstruction from engineering drawings. A new method is presented to label various views from a section-involved drawing and i...
Jie-Hui Gong, Hui Zhang, Bin Jiang, Jia-Guang Sun
IPPS
2006
IEEE
14 years 1 months ago
Cooperative checkpointing theory
Cooperative checkpointing uses global knowledge of the state and health of the machine to improve performance and reliability by dynamically deciding when to skip checkpoint reque...
Adam J. Oliner, Larry Rudolph, Ramendra K. Sahoo
RTA
2005
Springer
14 years 1 months ago
Intruder Deduction for AC-Like Equational Theories with Homomorphisms
Cryptographic protocols are small programs which involve a high level of concurrency and which are difficult to analyze by hand. The most successful methods to verify such protocol...
Pascal Lafourcade, Denis Lugiez, Ralf Treinen
CHI
2005
ACM
14 years 8 months ago
A comparison of techniques for multi-display reaching
Recent advances in multi-user collaboration have seen a proliferation of interaction techniques for moving digital objects from one device to another. However, little is known abo...
Miguel A. Nacenta, Dzmitry Aliakseyeu, Sriram Subr...
EWHCI
1993
13 years 12 months ago
Applying the Wizard of Oz Technique to the Study of Multimodal Systems
The Wizard of Oz (WOz) technique is an experimental evaluation mechanism. It allows the observation of a user operating an apparently fully functioning system whose missing service...
Daniel Salber, Joëlle Coutaz