Sciweavers

354 search results - page 50 / 71
» Constraints of Behavioural Inheritance
Sort
View
129
Voted
IWC
2002
121views more  IWC 2002»
15 years 3 months ago
Discovering user communities on the Internet using unsupervised machine learning techniques
Interest in the analysis of user behaviour on the Internet has been increasing rapidly, especially since the advent of electronic commerce. In this context, we argue here for the ...
Georgios Paliouras, Christos Papatheodorou, Vangel...
JVCA
1998
90views more  JVCA 1998»
15 years 3 months ago
Interactive rigid body manipulation with obstacle contacts
The interactive manipulation of rigid objects in virtual reality environments requires an object behaviour which is at least physically plausible to be useful for applications lik...
Matthias Buck, Elmar Schömer
IOT
2010
15 years 1 months ago
DEHEMS: A user-driven domestic energy monitoring system
Persuasive energy monitoring technology has the potential to inspire sustainable energy lifestyles within the home. However, to effect positive ecological behaviour change, a more ...
Vasughi Sundramoorthy, Qi Liu, Grahame Cooper, Nig...
266
Voted
POPL
2009
ACM
16 years 4 months ago
Relaxed memory models: an operational approach
Memory models define an interface between programs written in some language and their implementation, determining which behaviour the memory (and thus a program) is allowed to hav...
Gérard Boudol, Gustavo Petri
225
Voted
ECOOP
2009
Springer
16 years 4 months ago
From Public to Private to Absent: Refactoring Java Programs under Constrained Accessibility
Contemporary refactoring tools for JAVA aiding in the restructuring of programs have problems with respecting access modifiers such as public and private: while some tools provide ...
Friedrich Steimann, Andreas Thies