Sciweavers

309 search results - page 47 / 62
» Code Transformations for One-Pass Analysis
Sort
View
OOPSLA
2004
Springer
15 years 5 months ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
CLUSTER
2003
IEEE
15 years 5 months ago
Compiler Optimized Remote Method Invocation
We further increase the efficiency of Java RMI programs. Where other optimizing re-implementations of RMI use pre-processors to create stubs and skeletons and to create class spe...
Ronald Veldema, Michael Philippsen
CAIP
2009
Springer
156views Image Analysis» more  CAIP 2009»
15 years 6 months ago
Bio-inspired Approach for the Recognition of Goal-Directed Hand Actions
The recognition of transitive, goal-directed actions requires a sensible balance between the representation of specific shape details of effector and goal object and robustness w...
Falk Fleischer, Antonino Casile, Martin A. Giese
FGCN
2008
IEEE
153views Communications» more  FGCN 2008»
15 years 6 months ago
Experimental Study on Neuronal Spike Sorting Methods
When recording extracellular neural activity, it is often necessary to distinguish action potentials arising from distinct cells near the electrode tip, a process commonly referre...
Jianhua Dai, Xiaochun Liu, Yu Yi, Huaijian Zhang, ...
MEMOCODE
2008
IEEE
15 years 6 months ago
From Data to Events: Checking Properties on the Control of a System
We present a component-based description language for heterogeneous systems composed of several data flow processing components and a unique eventbased controller. Descriptions a...
Christophe Jacquet, Frédéric Boulang...