Sciweavers

3730 search results - page 667 / 746
» Robust design of embedded systems
Sort
View
TOSEM
2010
159views more  TOSEM 2010»
14 years 11 months ago
Clone region descriptors: Representing and tracking duplication in source code
n the concept of abstract clone region descriptors (CRDs), which describe clone regions using a combination of their syntactic, structural, and lexical information. We present our ...
Ekwa Duala-Ekoko, Martin P. Robillard
TVCG
2010
166views more  TVCG 2010»
14 years 11 months ago
An Extension of Wilkinson's Algorithm for Positioning Tick Labels on Axes
—The non-data components of a visualization, such as axes and legends, can often be just as important as the data itself. They provide contextual information essential to interpr...
Justin Talbot, Sharon Lin, Pat Hanrahan
ICDE
2011
IEEE
222views Database» more  ICDE 2011»
14 years 4 months ago
Dynamic prioritization of database queries
— Enterprise database systems handle a variety of diverse query workloads that are of different importance to the business. For example, periodic reporting queries are usually mi...
Sivaramakrishnan Narayanan, Florian Waas
107
Voted
ICCV
2011
IEEE
14 years 21 days ago
HMDB: A Large Video Database for Human Motion Recognition
With nearly one billion online videos viewed everyday, an emerging new frontier in computer vision research is recognition and search in video. While much effort has been devoted ...
Hildegard Kuehne, Hueihan Jhuang, Estibaliz Garrot...
107
Voted
ESOP
2005
Springer
15 years 6 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers