Sun and the CERT recommend for secure Java development to not allow partially initialized objects to be accessed. The CERT considers the severity of the risks taken by not followin...
Laurent Hubert, Thomas P. Jensen, Vincent Monfort,...
This paper discusses interactive evolutionary algorithms and their application in swarm-based image generation. From an artistās perspective, the computer-generated patterns oļ¬...
Namrata Khemka, Scott Novakowski, Gerald Hushlak, ...
Basic data flow patterns which we call idioms, such as stream, transpose, reduction, random access and stencil, are common in scientific numerical applications. We hypothesize tha...
Jiahua He, Allan Snavely, Rob F. Van der Wijngaart...
In many sensor networking environments, the sensor nodes have limited battery capacity and processing power. Hence, it is imperative to develop solutions that are energy-eļ¬cient...
Abstractā Robot imitation is a useful and promising alternative to robot programming. Robot imitation involves two crucial issues. The ļ¬rst is how a robot can imitate a human w...
Ryunosuke Yokoya, Tetsuya Ogata, Jun Tani, Kazunor...