Sciweavers

1487 search results - page 217 / 298
» Two Kinds of Metonymy
Sort
View
ESE
2008
112views Database» more  ESE 2008»
13 years 7 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey
CORR
2006
Springer
83views Education» more  CORR 2006»
13 years 7 months ago
An unlikely result
What happens to a dictator once he is out of power is not just a matter of justice or a random result. Using game theory we show that post-power scenarios depend largely on two fac...
A. N. Other
ENTCS
2006
144views more  ENTCS 2006»
13 years 7 months ago
Infinitary Howe's Method
Howe's method is a well-known technique for proving that various kinds of applicative bisimilarity (or similarity) on a functional language are congruences (or precongruences...
Paul Blain Levy
IJRR
2008
136views more  IJRR 2008»
13 years 7 months ago
Image-based Visual Servoing with Central Catadioptric Cameras
: This paper presents an image-based visual servoing strategy for the autonomous navigation of a mobile holonomic robot from a current toward a desired pose, specified only through...
Gian Luca Mariottini, Domenico Prattichizzo
JCIT
2008
100views more  JCIT 2008»
13 years 7 months ago
Basic Portal System with the Function of Communication Control for Each User
The Personal Portal is generally used as a communication mean and serves as an entrance to users where they can acquire interested information on the network. We have several prob...
Kazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi...