Sciweavers

133 search results - page 23 / 27
» Inference of Session Types From Control Flow
Sort
View
AVI
2004
13 years 8 months ago
Visualizing programs with Jeliot 3
We present a program visualization tool called Jeliot 3 that is designed to aid novice students to learn procedural and object oriented programming. The key feature of Jeliot is t...
Andrés Moreno, Niko Myller, Erkki Sutinen, ...
JDCTA
2010
688views more  JDCTA 2010»
13 years 1 months ago
Hand Mouse: Real Time Hand Motion Detection System Based on Analysis of Finger Blobs
Hand detection is a fundamental step in many practical applications as gesture recognition, video surveillance, and multimodal machine interface and so on. The aim of this paper i...
Ibrahim Furkan Ince, Manuel Socarras-Garzon, Tae-C...
DAC
2008
ACM
13 years 8 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
MICCAI
2006
Springer
14 years 7 months ago
Simulation of Acquisition Artefacts in MR Scans: Effects on Automatic Measures of Brain Atrophy
Automatic algorithms in conjunction with longitudinal MR brain images can be used to measure cerebral atrophy, which is particularly pronounced in several types of dementia. An atr...
Oscar Camara-Rey, Beatrix I. Sneller, Gerard R. Ri...
USS
2004
13 years 8 months ago
Design of the EROS Trusted Window System
Window systems are the primary mediator of user input and output in modern computing systems. They are also a commonly used interprocess communication mechanism. As a result, they...
Jonathan S. Shapiro, John Vanderburgh, Eric Northu...