Sciweavers

1554 search results - page 270 / 311
» Testing Polymorphic Behavior
Sort
View
126
Voted
MSWIM
2009
ACM
15 years 7 months ago
Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++
Host Identity Protocol (HIP) decouples IP addresses from higher layer Internet applications by proposing a new, cryptographic namespace for host identities. HIP has great potentia...
László Bokor, Szabolcs Novácz...
96
Voted
PPPJ
2009
ACM
15 years 7 months ago
Tracking performance across software revisions
Repository-based revision control systems such as CVS, RCS, Subversion, and GIT, are extremely useful tools that enable software developers to concurrently modify source code, man...
Nagy Mostafa, Chandra Krintz
122
Voted
KDD
2009
ACM
196views Data Mining» more  KDD 2009»
15 years 7 months ago
WhereNext: a location predictor on trajectory pattern mining
The pervasiveness of mobile devices and location based services is leading to an increasing volume of mobility data. This side effect provides the opportunity for innovative meth...
Anna Monreale, Fabio Pinelli, Roberto Trasarti, Fo...
98
Voted
ICRA
2009
IEEE
121views Robotics» more  ICRA 2009»
15 years 7 months ago
Exploiting angular momentum to enhance bipedal center-of-mass control
Abstract— Recent humanoid control investigations have emphasized the importance of controlling whole-body angular momentum throughout a movement task. For typical movement tasks,...
Andreas Hofmann, Marko B. Popovic, Hugh M. Herr
OOPSLA
2009
Springer
15 years 7 months ago
Enhancing source-level programming tools with an awareness of transparent program transformations
Programs written in managed languages are compiled to a platform-independent intermediate representation, such as Java bytecode. The relative high level of Java bytecode has engen...
Myoungkyu Song, Eli Tilevich