Sciweavers

1646 search results - page 167 / 330
» Inlining of Virtual Methods
Sort
View
125
Voted
WSC
2007
15 years 4 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
IWEC
2007
15 years 3 months ago
Pass the Ball: Game-Based Learning of Software Design
Based on our experience using active learning methods to teach object-oriented software design we propose a game-based approach to take the classroom experience into a virtual envi...
Guillermo Jiménez-Díaz, Mercedes G&o...
WSCG
2003
193views more  WSCG 2003»
15 years 3 months ago
Automatically Generating Roof Models from Building Footprints
Modelling Large Urban Environments using traditional modelling techniques would prove too time consuming a process. Consequently a method is required for generating large urban en...
R. G. Laycock, A. M. Day
GREC
2009
Springer
15 years 4 days ago
Robust and Precise Circular Arc Detection
In this paper we present a method to robustly detect circular arcs in a line drawing image. The method is fast, robust and very reliable, and is capable of assessing the quality of...
Bart Lamiroy, Yassine Guebbas
DAC
1999
ACM
15 years 6 months ago
Test Generation for Gigahertz Processors Using an Automatic Functional Constraint Extractor
As the sizes of general and special purpose processors increase rapidly, generating high quality manufacturing tests which can be run at native speeds is becoming a serious proble...
Raghuram S. Tupuri, Arun Krishnamachary, Jacob A. ...