Sciweavers

391 search results - page 58 / 79
» Evaluation of Length-Lex Set Variables
Sort
View
CSMR
2009
IEEE
14 years 5 months ago
Identification of Extract Method Refactoring Opportunities
Extract Method has been recognized as one of the most important refactorings, since it decomposes large methods and can be used in combination with other refactorings for fixing a...
Nikolaos Tsantalis, Alexander Chatzigeorgiou
ARCS
2009
Springer
14 years 5 months ago
Empirical Performance Models for Java Workloads
Abstract. Java is widely deployed on a variety of processor architectures. Consequently, an understanding of microarchitecture level Java performance is critical to optimize curren...
Pradeep Rao, Kazuaki Murakami
KES
2009
Springer
14 years 5 months ago
Urban Vehicle Tracking Using a Combined 3D Model Detector and Classifier
This paper presents a tracking system for vehicles in urban traffic scenes. The task of automatic video analysis for existing CCTV infrastructure is of increasing interest due to b...
Norbert Buch, Fei Yin, James Orwell, Dimitrios Mak...
MHCI
2009
Springer
14 years 5 months ago
Gestures all around us: user differences in social acceptability perceptions of gesture based interfaces
Gesture based interfaces provide a new way for us to interact with mobile devices, but also require us to make new decisions about how we feel about this new technology and which ...
Julie Rico, Stephen A. Brewster
APSEC
2008
IEEE
14 years 5 months ago
Flexible Generation of Pervasive Web Services Using OSGi Declarative Services and OWL Ontologies
There is a growing trend to deploy web services in pervasive computing environments. Implementing web services on networked, embedded devices leads to a set of challenges, includi...
Klaus Marius Hansen, Weishan Zhang, João Fe...