Sciweavers

1170 search results - page 112 / 234
» How Fast Is Too Fast
Sort
View
ICSE
2008
IEEE-ACM
16 years 3 months ago
Source-level debugging with the whyline
The visualizations of the Whyline are presented, which focus on supporting the exploration a source code and how it executes. The visualization is concise, simple to navigate, and...
Andrew J. Ko, Brad A. Myers
DCC
2007
IEEE
16 years 2 months ago
Efficient pairing computation on supersingular Abelian varieties
Abstract. We present a general technique for the efficient computation of pairings on supersingular Abelian varieties. This formulation, which we call the eta pairing, generalises ...
Paulo S. L. M. Barreto, Steven D. Galbraith, Colm ...
PADL
2010
Springer
16 years 2 days ago
Conversion by Evaluation
Abstract. We show how testing convertibility of two types in dependently typed systems can advantageously be implemented instead untyped normalization by evaluation, thereby reusin...
Mathieu Boespflug
IEEEARES
2009
IEEE
15 years 10 months ago
An Architectural Foundation for Security Model Sharing and Reuse
Within the field of software security we have yet to find efficient ways on how to learn from past mistakes and integrate security as a natural part of software development. Th...
Per Håkon Meland, Shanai Ardi, Jostein Jense...
ICRA
2009
IEEE
173views Robotics» more  ICRA 2009»
15 years 10 months ago
Vision-based guidance and control of a hovering vehicle in unknown, GPS-denied environments
— This paper describes the system architecture and core algorithms for a quadrotor helicopter that uses vision data to navigate an unknown, indoor, GPS-denied environment. Withou...
Spencer Ahrens, Daniel Levine, Gregory Andrews, Jo...