Sciweavers

26354 search results - page 5250 / 5271
» How we refactor, and how we know it
Sort
View
JSS
2000
85views more  JSS 2000»
13 years 7 months ago
An experimental comparison of reading techniques for defect detection in UML design documents
The basic motivation for software inspections is to detect and remove defects before they propagate to subsequent development phases where their detection and removal becomes more...
Oliver Laitenberger, Colin Atkinson, Maud Schlich,...
NN
2000
Springer
170views Neural Networks» more  NN 2000»
13 years 7 months ago
Synthetic brain imaging: grasping, mirror neurons and imitation
The article contributes to the quest to relate global data on brain and behavior (e.g. from PET, Positron Emission Tomography, and fMRI, functional Magnetic Resonance Imaging) to ...
Michael A. Arbib, Aude Billard, Marco Iacoboni, Er...
GIS
2002
ACM
13 years 7 months ago
Design of field wrappers for mobile field data collection
In mobile field data collection, data gatherer requires to get geospatial information service to support in navigating to the right locations, describing context of observed objec...
Peisheng Zhao, Sarah Nusser, Leslie L. Miller
AAI
1998
112views more  AAI 1998»
13 years 7 months ago
The Robocup Physical Agent Challenge: Phase I
Traditional AI research has not given due attention to the important role that physical bodies play for agents as their interactions produce complex emergent behaviors to achieve ...
Minoru Asada, Peter Stone, Hiroaki Kitano, Barry B...
CACM
1998
81views more  CACM 1998»
13 years 7 months ago
Toward a Model of Type Inheritance
rigorous, and abstract— clearly defined and generally agreed—type inheritance model. To quote an article by Taivalsaari: “The basic idea of inheritance is quite simple ... [a...
C. J. Date, Hugh Darwen
« Prev « First page 5250 / 5271 Last » Next »