Sciweavers

7430 search results - page 1264 / 1486
» Programming Applications in CIFF
Sort
View
ICSE
2005
IEEE-ACM
16 years 5 months ago
A B.S. degree in informatics: contextualizing software engineering education
Software engineering (SE) is very different in focus from traditional computer science: it is not just about computers and software, but as much about the context in which they ar...
André van der Hoek, David G. Kay, Debra J. ...
144
Voted
ICSE
2008
IEEE-ACM
16 years 5 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
3DIM
2007
IEEE
16 years 5 months ago
Automatic Pose Estimation for Range Images on the GPU
Object pose (location and orientation) estimation is a common task in many computer vision applications. Although many methods exist, most algorithms need manual initialization ...
Marcel Germann, Michael D. Breitenstein, In Kyu Pa...
149
Voted
ICDE
2010
IEEE
202views Database» more  ICDE 2010»
16 years 4 months ago
Generating code for holistic query evaluation
We present the application of customized code generation to database query evaluation. The idea is to use a collection of highly efficient code templates and dynamically instantiat...
Konstantinos Krikellas, Marcelo Cintra, Stratis Vi...
PERCOM
2003
ACM
16 years 4 months ago
Evaluation of Kalman Filtering for Network Time Keeping
Time information is critical for a variety of applications in distributed environments that facilitate pervasive computing and communication. This work describes and evaluates a no...
Aggelos Bletsas
« Prev « First page 1264 / 1486 Last » Next »