Sciweavers

1636 search results - page 127 / 328
» Detecting similar software applications
Sort
View
AOSD
2011
ACM
14 years 11 months ago
Experiences documenting and preserving software constraints using aspects
Software systems are increasingly being built as compositions of reusable artifacts (components, frameworks, toolkits, plug-ins, APIs, etc) that have non-trivial usage constraints...
Roberto Silveira Silva Filho, François Bron...
ICRA
1999
IEEE
117views Robotics» more  ICRA 1999»
15 years 9 months ago
Collision Control in Teleoperation by Virtual Force Reflection: An Application to the ROBTET System
: Well known collision avoiding approaches used in automatic robot path planning are also applied in teleoperation systems when moving in hazardous environments. In such cases, it ...
Miguel Hernando, Ernesto Gambao, E. Pinto, Antonio...
IJNSEC
2006
96views more  IJNSEC 2006»
15 years 4 months ago
A Memory Symptom-based Virus Detection Approach
The widespread use of the Internet has caused computer security to become an important issue. Currently, antivirus software is the primary mechanism that prevents computers from t...
Hsien-Chou Liao, Yi-Hsiang Wang
CVPR
1998
IEEE
16 years 6 months ago
Real-Time 2-D Feature Detection on a Reconfigurable Computer
We have designed and implemented a system for real-time detection of 2-D features on a reconfigurable computer based on Field Programmable Gate Arrays (FPGA `s). We envision this ...
Arrigo Benedetti, Pietro Perona
ICTAC
2009
Springer
15 years 2 months ago
Automatic Conflict Detection on Contracts
Abstract. Many software applications are based on collaborating, yet competing, agents or virtual organisations exchanging services. Contracts, expressing obligations, permissions ...
Stephen Fenech, Gordon J. Pace, Gerardo Schneider