Sciweavers

5838 search results - page 1021 / 1168
» A File System for System Programming in Ubiquitous Computing
Sort
View
161
Voted
AAMAS
1999
Springer
15 years 3 months ago
Verifying Compliance with Commitment Protocols
Interaction protocols are specific, often standard, constraints on the behaviors of autonomous agents in a multiagent system. Protocols are essential to the functioning of open sys...
Mahadevan Venkatraman, Munindar P. Singh
150
Voted
VC
2002
129views more  VC 2002»
15 years 3 months ago
Modeling a Murex cabritii sea shell with a structured implicit surface modeler
Implicit surface modeling systems have been used since the mid-1980s for the generation of cartoon-like characters. Recently implicit models combined with constructive solid geome...
Callum Galbraith, Przemyslaw Prusinkiewicz, Brian ...
153
Voted
SEKE
2010
Springer
15 years 2 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
124
Voted
SIGSOFT
2010
ACM
15 years 1 months ago
Speculative analysis: exploring future development states of software
Most software tools and environments help developers analyze the present and past development states of their software systems. Few approaches have investigated the potential cons...
Yuriy Brun, Reid Holmes, Michael D. Ernst, David N...
112
Voted
DAC
2002
ACM
16 years 4 months ago
Retargetable binary utilities
Since software is playing an increasingly important role in systemon-chip, retargetable compilation has been an active research area in the last few years. However, the retargetti...
Maghsoud Abbaspour, Jianwen Zhu
« Prev « First page 1021 / 1168 Last » Next »