Sciweavers

1687 search results - page 186 / 338
» Which pointer analysis should I use
Sort
View
145
Voted
ASSETS
2009
ACM
15 years 2 months ago
Fall and emergency detection with mobile phones
In this demo, we present an application for mobile phones which can monitor physical activities of users and detect unexpected emergency situations such as a sudden fall or accide...
Hamed Ketabdar, Tim Polzehl
INFOCOM
2008
IEEE
15 years 11 months ago
On the Design of Load Factor based Congestion Control Protocols for Next-Generation Networks
— Load factor based congestion control schemes have shown to enhance network performance, in terms of utilization, packet loss and delay. In these schemes, using more accurate re...
Ihsan A. Qazi, Taieb Znati
PDP
2007
IEEE
15 years 10 months ago
A High-Level Reference Model for Reusable Object-Level Coordination Support in Groupware Applications
The success of groupware software largely depends on its capability for being reused in different collaborative scenarios without requiring significant software development effort...
Miguel A. Gomez-Hernandez, Juan I. Asensio-P&eacut...
JUCS
2008
140views more  JUCS 2008»
15 years 4 months ago
The Computable Multi-Functions on Multi-represented Sets are Closed under Programming
: In the representation approach to computable analysis (TTE) [Grz55, i00], abstract data like rational numbers, real numbers, compact sets or continuous real functions are represe...
Klaus Weihrauch
163
Voted
DAS
2010
Springer
15 years 3 months ago
Automatic unsupervised parameter selection for character segmentation
A major difficulty for designing a document image segmentation methodology is the proper value selection for all involved parameters. This is usually done after experimentations o...
Georgios Vamvakas, Nikolaos Stamatopoulos, Basilio...