Sciweavers

26354 search results - page 96 / 5271
» How we refactor, and how we know it
Sort
View
IPPS
1996
IEEE
14 years 2 months ago
How to Optimize Residual Communications?
Minimizing communications when mapping affine loop nests onto distributed memory parallel computers has already drawn a lot of attention. This paper focuses on the next step: as i...
Michèle Dion, Cyril Randriamaro, Yves Rober...
IPPS
2008
IEEE
14 years 4 months ago
Improving software reliability and productivity via mining program source code
A software system interacts with third-party libraries through various APIs. Insufficient documentation and constant refactorings of third-party libraries make API library reuse ...
Tao Xie, Mithun Acharya, Suresh Thummalapenta, Kun...
TVCG
2010
217views more  TVCG 2010»
13 years 8 months ago
How Information Visualization Novices Construct Visualizations
—It remains challenging for information visualization novices to rapidly construct visualizations during exploratory data analysis. We conducted an exploratory laboratory study i...
Lars Grammel, Melanie Tory, Margaret-Anne D. Store...
ICRA
2008
IEEE
179views Robotics» more  ICRA 2008»
14 years 4 months ago
How can human motion prediction increase transparency?
—A major issue in the field of human-robot interaction for assistance to manipulation is transparency. This basic feature qualifies the capacity for a robot to follow human mov...
Nathanaël Jarrassé, Jamie Paik, Vivian...
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
14 years 2 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...