Sciweavers

1035 search results - page 165 / 207
» Patterns Approach to Building Software Systems
Sort
View
ICFP
2009
ACM
14 years 9 months ago
Effective interactive proofs for higher-order imperative programs
We present a new approach for constructing and verifying higherorder, imperative programs using the Coq proof assistant. We build on the past work on the Ynot system, which is bas...
Adam J. Chlipala, J. Gregory Malecha, Greg Morrise...
CASCON
1996
99views Education» more  CASCON 1996»
13 years 10 months ago
Modeling and analysis of the Unix communication subsystems
The performance of host communication subsystems is an important research topic in computer networks.1 Performance metrics such as throughput, delay, and packet loss are important...
Yi-Chun Chu, Toby J. Teorey
RAID
2010
Springer
13 years 7 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
TVCG
2010
208views more  TVCG 2010»
13 years 7 months ago
Example-Based Human Motion Denoising
—With the proliferation of motion capture data, interest in removing noise and outliers from motion capture data has increased. In this paper, we introduce an efficient human mo...
Hui Lou, Jinxiang Chai
GROUP
2009
ACM
14 years 3 months ago
Cluestr: mobile social networking for enhanced group communication
Recent technological advances foster the spreading of social software in the mobile domain. Hence, future usage patterns of mobile devices will involve more group interaction. Whi...
Reto Grob, Michael Kuhn 0002, Roger Wattenhofer, M...