Sciweavers

1770 search results - page 68 / 354
» Writing requirements in computer security
Sort
View
PLDI
2010
ACM
14 years 2 months ago
Traceable data types for self-adjusting computation
Self-adjusting computation provides an evaluation model where computations can respond automatically to modifications to their data by using a mechanism for propagating modifica...
Umut A. Acar, Guy E. Blelloch, Ruy Ley-Wild, Kanat...
CHI
2010
ACM
14 years 3 months ago
GUI testing using computer vision
Testing a GUI’s visual behavior typically requires human testers to interact with the GUI and to observe whether the expected results of interaction are presented. This paper pr...
Tsung-Hsiang Chang, Tom Yeh, Robert C. Miller
VLSID
2004
IEEE
147views VLSI» more  VLSID 2004»
14 years 9 months ago
Computing Silent Gate Models for Noise Analysis from Slew and Delay Tables
Abstract--In this paper, we present a new approach to calculate the steady state resistance values for CMOS library gates. These resistances are defined as simple equivalent models...
Shabbir H. Batterywala, Narendra V. Shenoy
AAAI
2006
13 years 10 months ago
ScriptEase - Motivational Behaviors for Interactive Characters in Computer Role-Playing Games
ScriptEase is a tool that allows authors with no programming experience to create interactive stories for computer role-playing games. Instead of writing scripting code manually, ...
Maria Cutumisu, Duane Szafron, Jonathan Schaeffer,...
SPIESR
1998
151views Database» more  SPIESR 1998»
13 years 10 months ago
Synthesizing Parallel Imaging Applications Using the CAP Computer-Aided Parallelization Tool
Abstract. Imaging applications such as filtering, image transforms and compression/decompression require vast amounts of computing power when applied to large data sets. These appl...
Benoit A. Gennart, Marc Mazzariol, Vincent Messerl...