Sciweavers

730 search results - page 143 / 146
» Security-typed programming within dependently typed programm...
Sort
View
ATAL
2009
Springer
14 years 1 months ago
Reasoning intra-dependency in commitments for robust scheduling
Commitment-modeled protocols enable flexible and robust interactions among agents. However, existing work has focused on features and capabilities of protocols without considerin...
Mingzhong Wang, Kotagiri Ramamohanarao, Jinjun Che...
VRCAI
2006
ACM
14 years 1 months ago
Erasing, digging and clipping in volumetric datasets with one or two hands
Visualization of volumetric datasets is common in many fields and has been an active area of research in the past two decades. In spite of developments in volume visualization te...
Rafael Huff, Carlos A. Dietrich, Luciana Porcher N...
GECCO
2009
Springer
193views Optimization» more  GECCO 2009»
14 years 35 min ago
Optimization of dynamic memory managers for embedded systems using grammatical evolution
New portable consumer embedded devices must execute multimedia applications (e.g., 3D games, video players and signal processing software, etc.) that demand extensive memory acces...
José L. Risco-Martín, David Atienza,...
DEXA
1999
Springer
87views Database» more  DEXA 1999»
13 years 11 months ago
SECONDO/QP: Implementation of a Generic Query Processor
: In an extensible database system, evaluation of a query plan is done in cooperation between a collection of operator implementation functions and a component of the DBMS that we ...
Ralf Hartmut Güting, Stefan Dieker, Claudia F...
CSMR
2004
IEEE
13 years 11 months ago
Supporting Architectural Restructuring by Analyzing Feature Models
In order to lower the risk, reengineering projects aim at high reuse rates. Therefore, tasks like architectural restructuring have to be performed in a way that developed new syst...
Ilian Pashov, Matthias Riebisch, Ilka Philippow