Sciweavers

287 search results - page 44 / 58
» Audio authentication based on distributed source coding
Sort
View
ECOOPW
1997
Springer
15 years 1 months ago
The Object Model for a Product Based Development Process
The traditional workflow process model is typically illustrated with a graph of activities, tasks, deliverables and techniques. From an object-oriented perspective, every identifi...
Pavel Hruby
ICSE
2008
IEEE-ACM
15 years 10 months ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su
HPDC
2000
IEEE
15 years 2 months ago
CAVEStudy: An Infrastructure for Computational Steering in Virtual Reality Environments
We present the CAVEStudy system that enables scientists to interactively steer a simulation from a virtual reality (VR) environment. No modification to the source code is necessa...
Luc Renambot, Henri E. Bal, Desmond Germans, Hans ...
ICSM
2007
IEEE
15 years 3 months ago
Debugging Integrated Systems: An Ethnographic Study of Debugging Practice
This paper explores how software developers debug integrated systems, where they have little or no access to the source code of the third-party software the system is composed of....
Thomas Østerlie, Alf Inge Wang
EAGC
2004
Springer
15 years 1 months ago
SCALEA-G: A Unified Monitoring and Performance Analysis System for the Grid
Abstract. This paper describes SCALEA-G, a unified monitoring and performance analysis system for the Grid. SCALEA-G is implemented as a set of grid services based on the Open Grid...
Hong Linh Truong, Thomas Fahringer