Sciweavers

10458 search results - page 1835 / 2092
» Modeling Features at Runtime
Sort
View
ISPASS
2006
IEEE
15 years 8 months ago
Comparing multinomial and k-means clustering for SimPoint
SimPoint is a technique used to pick what parts of the program’s execution to simulate in order to have a complete picture of execution. SimPoint uses data clustering algorithms...
Greg Hamerly, Erez Perelman, Brad Calder
141
Voted
LCN
2006
IEEE
15 years 8 months ago
Landscape-3D; A Robust Localization Scheme for Sensor Networks over Complex 3D Terrains
— Despite the fact that sensor networks could often be deployed over three-dimensional (3D) terrains, most approaches on sensor localizations are designed and evaluated consideri...
Liqiang Zhang, Xiaobo Zhou, Qiang Cheng
114
Voted
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 8 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
SMI
2006
IEEE
112views Image Analysis» more  SMI 2006»
15 years 8 months ago
ReMESH: An Interactive Environment to Edit and Repair Triangle Meshes
Polygonal meshes obtained from acquisition of real-world objects may easily exhibit topological or geometrical defects, which often prevent subsequent processing and analysis to p...
Marco Attene, Bianca Falcidieno
154
Voted
AOSD
2006
ACM
15 years 8 months ago
Relationship aspects
The relationships between objects in object-oriented programs are as important as the objects themselves. Unfortunately, most objectoriented programming languages provide little s...
David J. Pearce, James Noble
« Prev « First page 1835 / 2092 Last » Next »