Sciweavers

2015 search results - page 202 / 403
» Hidden Software Capabilities
Sort
View
SAC
2009
ACM
15 years 7 months ago
Annotating UDDI registries to support the management of composite services
The future of service-centric environments suggests that organizations will dynamically discover and utilize web services for new business processes particularly those that span m...
M. Brian Blake, Michael F. Nowlan, Ajay Bansal, Sr...
LCPC
2009
Springer
15 years 7 months ago
Loop Transformation Recipes for Code Generation and Auto-Tuning
Abstract. In this paper, we describe transformation recipes, which provide a high-level interface to the code transformation and code generation capability of a compiler. These rec...
Mary W. Hall, Jacqueline Chame, Chun Chen, Jaewook...
109
Voted
UIST
2000
ACM
15 years 7 months ago
System lag tests for augmented and virtual environments
We describe a simple technique for accurately calibrating the temporal lag in augmented and virtual environments within the Enhanced Virtual Hand Lab (EVHL), a collection of hardw...
Colin Swindells, John Dill, Kellogg S. Booth
119
Voted
ICSE
1998
IEEE-ACM
15 years 6 months ago
Overcoming the NAH Syndrome for Inspection Deployment
: Despite considerable evidence to show that inspections can help reduce costs and improve quality, inspections are not widely deployed in the software industry. One of the likely ...
Pankaj Jalote, M. Haragopal
102
Voted
WCRE
1993
IEEE
15 years 6 months ago
Flexible Control for Program Recognition
Recognizing commonly used data structures and algorithms is a key activity in reverse engineering. Systems developed to automate this recognition process have been isolated, stand...
Linda M. Wills