Sciweavers

8808 search results - page 1514 / 1762
» Process Change Patterns
Sort
View
CCS
2001
ACM
15 years 3 months ago
Protecting Software Code by Guards
Abstract. Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protectin...
Hoi Chang, Mikhail J. Atallah
SIGGRAPH
2010
ACM
15 years 3 months ago
Feature-based locomotion controllers
This paper introduces an approach to control of physics-based characters based on high-level features of movement, such as centerof-mass, angular momentum, and end-effectors. Obje...
Martin de Lasa, Igor Mordatch, Aaron Hertzmann
ICS
2001
Tsinghua U.
15 years 3 months ago
Computer aided hand tuning (CAHT): "applying case-based reasoning to performance tuning"
For most parallel and high performance systems, tuning guides provide the users with advices to optimize the execution time of their programs. Execution time may be very sensitive...
Antoine Monsifrot, François Bodin
ICSE
2001
IEEE-ACM
15 years 3 months ago
Effective Software Architecture Design: From Global Analysis to UML Descriptions
It is now generally accepted that separating software architecture into multiple views can help in reducing complexity and in making sound decisions about design trade-offs. Our f...
Robert L. Nord, Daniel J. Paulish, Dilip Soni, Chr...
VLDB
2001
ACM
109views Database» more  VLDB 2001»
15 years 3 months ago
Mining Multi-Dimensional Constrained Gradients in Data Cubes
Constrained gradient analysis (similar to the “cubegrade” problem posed by Imielinski, et al. [9]) is to extract pairs of similar cell characteristics associated with big chan...
Guozhu Dong, Jiawei Han, Joyce M. W. Lam, Jian Pei...
« Prev « First page 1514 / 1762 Last » Next »