Sciweavers

1781 search results - page 130 / 357
» Visualizing program execution using user abstractions
Sort
View
APCSAC
2001
IEEE
15 years 6 months ago
Stacking them up: a Comparison of Virtual Machines
A popular trend in current software technology is to gain program portability by compiling programs to an inte form based on an abstract machine definition. Such approaches date b...
K. John Gough
165
Voted
PROCEDIA
2010
281views more  PROCEDIA 2010»
15 years 23 days ago
Introductory computational science using MATLAB and image processing
We describe a new course designed to introduce engineering students to computational thinking. One of the most significant challenges in teaching an introductory-level applied co...
D. Brian Larkins, William Harvey
128
Voted
SP
2003
IEEE
121views Security Privacy» more  SP 2003»
15 years 7 months ago
Specifying and Verifying Hardware for Tamper-Resistant Software
We specify a hardware architecture that supports tamper-resistant software by identifying an “idealized” hich gives the abstracted actions available to a single user program. ...
David Lie, John C. Mitchell, Chandramohan A. Thekk...
ECLIPSE
2006
ACM
15 years 8 months ago
Visualization of clone detection results
The goal of a clone detection tool is to identify sections of code that are duplicated in a program. The result of the detection is presented in some manner for the user to view, ...
Robert Tairas, Jeff Gray, Ira D. Baxter
CVIU
2007
108views more  CVIU 2007»
15 years 2 months ago
A real-time hand tracker using variable-length Markov models of behaviour
We present a novel approach for visual tracking of structured behaviour as observed in human–computer interaction. An automatically acquired variable-length Markov model is used...
Nikolay Stefanov, Aphrodite Galata, Roger J. Hubbo...