Sciweavers

1801 search results - page 136 / 361
» Pointing without a pointer
Sort
View
78
Voted
SIGSOFT
2007
ACM
15 years 11 months ago
Object and reference immutability using java generics
A compiler-checked immutability guarantee provides useful documentation, facilitates reasoning, and enables optimizations. This paper presents Immutability Generic Java (IGJ), a n...
Yoav Zibin, Alex Potanin, Mahmood Ali, Shay Artzi,...
86
Voted
SI3D
2010
ACM
15 years 5 months ago
Interactive fluid-particle simulation using translating Eulerian grids
We describe an interactive system featuring fluid-driven animation that responds to moving objects. Our system includes a GPUaccelerated Eulerian fluid solver that is suited for...
Jonathan M. Cohen, Sarah Tariq, Simon Green
77
Voted
PAM
2009
Springer
15 years 5 months ago
Inferring POP-Level ISP Topology through End-to-End Delay Measurement
In this paper, we propose a new topology inference technique that aims to reveals how ISPs deploy their layer two and three networks at the POP level, without relying on ISP core n...
Kaoru Yoshida, Yutaka Kikuchi, Masateru Yamamoto, ...
ICRA
2009
IEEE
170views Robotics» more  ICRA 2009»
15 years 5 months ago
Automatic high-precision self-calibration of camera-robot systems
— In this article a new method is presented to obtain a full and precise calibration of camera-robot systems with eyein-hand cameras. It achieves a simultaneous and numerically s...
Andreas Jordt, Nils T. Siebel, Gerald Sommer
75
Voted
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 5 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...