Sciweavers

1487 search results - page 217 / 298
» Two Kinds of Metonymy
Sort
View
117
Voted
ESE
2008
112views Database» more  ESE 2008»
15 years 22 days ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey
39
Voted
CORR
2006
Springer
83views Education» more  CORR 2006»
15 years 21 days ago
An unlikely result
What happens to a dictator once he is out of power is not just a matter of justice or a random result. Using game theory we show that post-power scenarios depend largely on two fac...
A. N. Other
86
Voted
ENTCS
2006
144views more  ENTCS 2006»
15 years 20 days ago
Infinitary Howe's Method
Howe's method is a well-known technique for proving that various kinds of applicative bisimilarity (or similarity) on a functional language are congruences (or precongruences...
Paul Blain Levy
IJRR
2008
136views more  IJRR 2008»
15 years 20 days ago
Image-based Visual Servoing with Central Catadioptric Cameras
: This paper presents an image-based visual servoing strategy for the autonomous navigation of a mobile holonomic robot from a current toward a desired pose, specified only through...
Gian Luca Mariottini, Domenico Prattichizzo
JCIT
2008
100views more  JCIT 2008»
15 years 19 days ago
Basic Portal System with the Function of Communication Control for Each User
The Personal Portal is generally used as a communication mean and serves as an entrance to users where they can acquire interested information on the network. We have several prob...
Kazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi...