Sciweavers

354 search results - page 50 / 71
» Constraints of Behavioural Inheritance
Sort
View
IWC
2002
121views more  IWC 2002»
14 years 11 months ago
Discovering user communities on the Internet using unsupervised machine learning techniques
Interest in the analysis of user behaviour on the Internet has been increasing rapidly, especially since the advent of electronic commerce. In this context, we argue here for the ...
Georgios Paliouras, Christos Papatheodorou, Vangel...
JVCA
1998
90views more  JVCA 1998»
14 years 11 months ago
Interactive rigid body manipulation with obstacle contacts
The interactive manipulation of rigid objects in virtual reality environments requires an object behaviour which is at least physically plausible to be useful for applications lik...
Matthias Buck, Elmar Schömer
IOT
2010
14 years 9 months ago
DEHEMS: A user-driven domestic energy monitoring system
Persuasive energy monitoring technology has the potential to inspire sustainable energy lifestyles within the home. However, to effect positive ecological behaviour change, a more ...
Vasughi Sundramoorthy, Qi Liu, Grahame Cooper, Nig...
POPL
2009
ACM
16 years 14 days ago
Relaxed memory models: an operational approach
Memory models define an interface between programs written in some language and their implementation, determining which behaviour the memory (and thus a program) is allowed to hav...
Gérard Boudol, Gustavo Petri
ECOOP
2009
Springer
16 years 14 days ago
From Public to Private to Absent: Refactoring Java Programs under Constrained Accessibility
Contemporary refactoring tools for JAVA aiding in the restructuring of programs have problems with respecting access modifiers such as public and private: while some tools provide ...
Friedrich Steimann, Andreas Thies