Sciweavers

747 search results - page 107 / 150
» Testing for tunneling opens
Sort
View
HICSS
2005
IEEE
120views Biometrics» more  HICSS 2005»
14 years 2 months ago
User Motivation and Persuasion Strategy for Peer-to-Peer Communities
In recent years, peer-to-peer systems have become more and more popular, especially with some successful applications like Napter, Kazaa and edoney. However, how to motivate user ...
Ran Cheng, Julita Vassileva
ICCV
2005
IEEE
14 years 2 months ago
Convex Grouping Combining Boundary and Region Information
Convexity is an important geometric property of many natural and man-made structures. Prior research has shown that it is imperative to many perceptual-organization and imageunder...
Joachim S. Stahl, Song Wang
PASTE
2005
ACM
14 years 2 months ago
Static control-flow analysis for reverse engineering of UML sequence diagrams
UML sequence diagrams are commonly used to represent the interactions among collaborating objects. Reverse-engineered sequence diagrams are constructed from existing code, and hav...
Atanas Rountev, Olga Volgin, Miriam Reddoch
PASTE
2005
ACM
14 years 2 months ago
Representation-independent program analysis
Program analysis has many applications in software engineering and high-performance computation, such as program understanding, debugging, testing, reverse engineering, and optimi...
Michelle Mills Strout, John M. Mellor-Crummey, Pau...
PODC
2005
ACM
14 years 2 months ago
Advanced contention management for dynamic software transactional memory
The obstruction-free Dynamic Software Transactional Memory (DSTM) system of Herlihy et al. allows only one transaction at a time to acquire an object for writing. Should a second ...
William N. Scherer III, Michael L. Scott