Sciweavers

323 search results - page 27 / 65
» Doing it right
Sort
View
DEBU
1998
115views more  DEBU 1998»
14 years 11 months ago
The Case for Non-transparent Replication: Examples from Bayou
Applications that rely on replicated data have different requirements for how their data is managed. For example, some applications may require that updates propagate amongst repl...
Douglas B. Terry, Karin Petersen, Mike Spreitzer, ...
ACRI
2004
Springer
15 years 5 months ago
Optimizing the Behavior of a Moving Creature in Software and in Hardware
We have investigated a problem where the goal is to find automatically the best rule for a cell in the cellular automata model. The cells are either of type OBSTACLE, EMPTY or CRE...
Mathias Halbach, Wolfgang Heenes, Rolf Hoffmann, J...
PLDI
2003
ACM
15 years 5 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
CLEF
2003
Springer
15 years 5 months ago
Pruning Texts with NLP and Expanding Queries with an Ontology: TagSearch
: The basic line of our action is first to use natural language processing to prune the texts and the query, and secondly to use an ontology to expand the queries. Last year The sy...
Gil Francopoulo
SI3D
1999
ACM
15 years 4 months ago
Voodoo dolls: seamless interaction at multiple scales in virtual environments
The Voodoo Dolls technique is a two-handed interaction technique for manipulating objects at a distance in immersive virtual environments. This technique addresses some limitation...
Jeffrey S. Pierce, Brian C. Stearns, Randy F. Paus...