Sciweavers

4616 search results - page 247 / 924
» Extreme Components Analysis
Sort
View
ICSE
2007
IEEE-ACM
16 years 4 months ago
Agile Methods: Crossing the Chasm
An armada of emerging agile methods of software development (with eXtreme Programming and Scrum being the most broadly used) is both gaining popularity and generating lots of cont...
Frank Maurer, Grigori Melnik
AINA
2009
IEEE
15 years 11 months ago
Opportunistic Routing for Disruption Tolerant Networks
—Opportunistic networks represent one of the most interesting evolution of MANET paradigm. Generally speaking, opportunistic networks enable user communication in environments wh...
Marcello Caleffi, Luigi Paura
HASKELL
2009
ACM
15 years 11 months ago
Roll your own test bed for embedded real-time protocols: a haskell experience
We present by example a new application domain for functional languages: emulators for embedded real-time protocols. As a casestudy, we implement a simple emulator for the Biphase...
Lee Pike, Geoffrey M. Brown, Alwyn Goodloe
ICRA
2008
IEEE
179views Robotics» more  ICRA 2008»
15 years 11 months ago
Torque transmission mechanism with nonlinear passive stiffness using mechanical singularity
— To introduce a passive compliant mechanism for robot joints is an effective way for impact absorption. However, because robot joints also require high torque transmission chara...
Masafumi Okada, Shintaro Kino
ICDM
2007
IEEE
180views Data Mining» more  ICDM 2007»
15 years 10 months ago
Mining Frequent Itemsets in a Stream
We study the problem of finding frequent itemsets in a continuous stream of transactions. The current frequency of an itemset in a stream is defined as its maximal frequency ove...
Toon Calders, Nele Dexters, Bart Goethals