Sciweavers

6274 search results - page 1148 / 1255
» Proofs, Programs, Processes
Sort
View
PVLDB
2008
136views more  PVLDB 2008»
13 years 9 months ago
Keyword query cleaning
Unlike traditional database queries, keyword queries do not adhere to predefined syntax and are often dirty with irrelevant words from natural languages. This makes accurate and e...
Ken Q. Pu, Xiaohui Yu
DCOSS
2010
Springer
13 years 9 months ago
Optimized Java Binary and Virtual Machine for Tiny Motes
Abstract. We have developed TakaTuka, a Java Virtual Machine optimized for tiny embedded devices such as wireless sensor motes. TakaTuka1 requires very little memory and processing...
Faisal Aslam, Luminous Fennell, Christian Schindel...
IAJIT
2010
162views more  IAJIT 2010»
13 years 9 months ago
Deriving Conceptual Schema from Domain Ontology: A Web Application Reverse Engineering Approach
: The heterogeneous and dynamic nature of components making up a web application, the lack of effective programming mechanisms for implementing basic software engineering principle...
Sidi Mohamed Benslimane, Mimoun Malki, Djelloul Bo...
ICFEM
2010
Springer
13 years 9 months ago
Loop Invariant Synthesis in a Combined Domain
Abstract. Automated verification of memory safety and functional correctness for heap-manipulating programs has been a challenging task, especially when dealing with complex data ...
Shengchao Qin, Guanhua He, Chenguang Luo, Wei-Ngan...
ICRA
2010
IEEE
157views Robotics» more  ICRA 2010»
13 years 8 months ago
Integrated planning and control of large tracked vehicles in open terrain
Abstract— Trajectory generation and control of large equipment in open field environments involves systematically and robustly operating in uncertain and dynamic terrain. This p...
Xiuyi Fan, Surya Singh, Florian Oppolzer, Eric Net...
« Prev « First page 1148 / 1255 Last » Next »