Sciweavers

1538 search results - page 258 / 308
» Programming with Patterns
Sort
View
122
Voted
ESORICS
2010
Springer
15 years 3 months ago
Enforcing Secure Object Initialization in Java
Sun and the CERT recommend for secure Java development to not allow partially initialized objects to be accessed. The CERT considers the severity of the risks taken by not followin...
Laurent Hubert, Thomas P. Jensen, Vincent Monfort,...
GECCO
2008
Springer
139views Optimization» more  GECCO 2008»
15 years 3 months ago
Evolutionary design of dynamic SwarmScapes
This paper discusses interactive evolutionary algorithms and their application in swarm-based image generation. From an artist’s perspective, the computer-generated patterns oļ¬...
Namrata Khemka, Scott Novakowski, Gerald Hushlak, ...
HPDC
2008
IEEE
15 years 2 months ago
Code coverage, performance approximation and automatic recognition of idioms in scientific applications
Basic data flow patterns which we call idioms, such as stream, transpose, reduction, random access and stencil, are common in scientific numerical applications. We hypothesize tha...
Jiahua He, Allan Snavely, Rob F. Van der Wijngaart...
ADHOC
2007
126views more  ADHOC 2007»
15 years 2 months ago
Energy-aware routing in sensor networks: A large system approach
In many sensor networking environments, the sensor nodes have limited battery capacity and processing power. Hence, it is imperative to develop solutions that are energy-efficient...
Longbi Lin, Ness B. Shroff, R. Srikant
AR
2007
99views more  AR 2007»
15 years 2 months ago
Experience-based imitation using RNNPB
Abstract— Robot imitation is a useful and promising alternative to robot programming. Robot imitation involves two crucial issues. The first is how a robot can imitate a human w...
Ryunosuke Yokoya, Tetsuya Ogata, Jun Tani, Kazunor...