Sciweavers

107 search results - page 16 / 22
» Dependable Polygon-Processing Algorithms for Safety-Critical...
Sort
View
ISVC
2009
Springer
15 years 4 months ago
Deformable Proximity Queries and Their Application in Mobile Manipulation Planning
Abstract. We describe a proximity query algorithm for the exact minimum distance computation between arbitrarily shaped objects. Special characteristics of the Gilbert-Johnson-Keer...
Marc Gissler, Christian Dornhege, Bernhard Nebel, ...
105
Voted
IRI
2005
IEEE
15 years 5 months ago
Issues of hierarchical heterogeneous modeling in component reusability
Heterogeneous systems are systems that obey different functioning laws. For instance, during the design of embedded systems, it is generally necessary to study both the controller...
Aimé Mokhoo Mbobi, Frédéric B...
SIGSOFT
2000
ACM
15 years 4 months ago
Implicit context: easing software evolution and reuse
Software systems should consist of simple, conceptually clean software components interacting along narrow, well-defined paths. All too often, this is not reality: complex compon...
Robert J. Walker, Gail C. Murphy
DAC
2010
ACM
14 years 12 months ago
Instruction cache locking using temporal reuse profile
The performance of most embedded systems is critically dependent on the average memory access latency. Improving the cache hit rate can have significant positive impact on the per...
Yun Liang, Tulika Mitra
79
Voted
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
15 years 3 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten