Sciweavers

1538 search results - page 258 / 308
» Programming with Patterns
Sort
View
ESORICS
2010
Springer
13 years 11 months ago
Enforcing Secure Object Initialization in Java
Sun and the CERT recommend for secure Java development to not allow partially initialized objects to be accessed. The CERT considers the severity of the risks taken by not followin...
Laurent Hubert, Thomas P. Jensen, Vincent Monfort,...
GECCO
2008
Springer
139views Optimization» more  GECCO 2008»
13 years 11 months ago
Evolutionary design of dynamic SwarmScapes
This paper discusses interactive evolutionary algorithms and their application in swarm-based image generation. From an artistā€™s perspective, the computer-generated patterns oļ¬...
Namrata Khemka, Scott Novakowski, Gerald Hushlak, ...
HPDC
2008
IEEE
13 years 10 months ago
Code coverage, performance approximation and automatic recognition of idioms in scientific applications
Basic data flow patterns which we call idioms, such as stream, transpose, reduction, random access and stencil, are common in scientific numerical applications. We hypothesize tha...
Jiahua He, Allan Snavely, Rob F. Van der Wijngaart...
ADHOC
2007
126views more  ADHOC 2007»
13 years 10 months ago
Energy-aware routing in sensor networks: A large system approach
In many sensor networking environments, the sensor nodes have limited battery capacity and processing power. Hence, it is imperative to develop solutions that are energy-eļ¬ƒcient...
Longbi Lin, Ness B. Shroff, R. Srikant
AR
2007
99views more  AR 2007»
13 years 10 months ago
Experience-based imitation using RNNPB
Abstractā€” Robot imitation is a useful and promising alternative to robot programming. Robot imitation involves two crucial issues. The ļ¬rst is how a robot can imitate a human w...
Ryunosuke Yokoya, Tetsuya Ogata, Jun Tani, Kazunor...