Sciweavers

8623 search results - page 1645 / 1725
» Software engineering for secure systems
Sort
View
TCS
2008
13 years 9 months ago
A typed lambda calculus with intersection types
Intersection types are well-known to type theorists mainly for two reasons. Firstly, they type all and only the strongly normalizable lambda terms. Secondly, the intersection type...
Viviana Bono, Betti Venneri, Lorenzo Bettini
WWW
2011
ACM
13 years 4 months ago
A case for query by image and text content: searching computer help using screenshots and keywords
The multimedia information retrieval community has dedicated extensive research effort to the problem of content-based image retrieval (CBIR). However, these systems find their ma...
Tom Yeh, Brandyn White, Jose San Pedro, Boris Katz...
UIST
2006
ACM
14 years 3 months ago
Translating keyword commands into executable code
Modern applications provide interfaces for scripting, but many users do not know how to write script commands. However, many users are familiar with the idea of entering keywords ...
Greg Little, Robert C. Miller
PLDI
2003
ACM
14 years 2 months ago
A comparison of empirical and model-driven optimization
Empirical program optimizers estimate the values of key optimization parameters by generating different program versions and running them on the actual hardware to determine which...
Kamen Yotov, Xiaoming Li, Gang Ren, Michael Cibuls...
IWCMC
2010
ACM
14 years 2 months ago
CRABSS: CalRAdio-Based advanced Spectrum Scanner for cognitive networks
The first step required by the process of cognition is the intelligent observation of the environment that surrounds the actors of such a process. We present the CalRAdio-Based a...
Riccardo Manfrin, Luca Boscato, Andrea Zanella, Mi...
« Prev « First page 1645 / 1725 Last » Next »