Sciweavers

478 search results - page 48 / 96
» Working Effectively with Legacy Code
Sort
View
FUNGAMES
2010
14 years 11 months ago
Recognizing self in puppet controlled virtual avatars
Recent work in neuroscience suggests that there is a common coding in the brain between perception, imagination and execution of movement. Further, this common coding is considere...
Ali Mazalek, Michael Nitsche, Sanjay Chandrasekhar...
ICCAD
2001
IEEE
128views Hardware» more  ICCAD 2001»
15 years 6 months ago
An Assembly-Level Execution-Time Model for Pipelined Architectures
The aim of this work is to provide an elegant and accurate static execution timing model for 32-bit microprocessor instruction sets, covering also inter–instruction effects. Suc...
Giovanni Beltrame, Carlo Brandolese, William Forna...
ICC
2008
IEEE
108views Communications» more  ICC 2008»
15 years 4 months ago
Hop-by-Hop Frame Aggregation for VoIP on Multi-Hop Wireless Networks
—The already severe inefficiency problem in running VoIP on the IEEE 802.11-based wireless LAN is exacerbated in multi-hop networks due to spatial interference. This paper prese...
Kyungsoo Lee, Sangki Yun, Inhye Kang, Hyogon Kim
DAGSTUHL
2006
14 years 11 months ago
Structural Descriptors for 3D Shapes
Assessing the similarity among 3D shapes is a challenging research topic, and effective shape descriptions have to be devised in order to support the matching process. There is a ...
Michela Spagnuolo, Silvia Biasotti, Bianca Falcidi...
CCS
2006
ACM
15 years 1 months ago
EXE: automatically generating inputs of death
This paper presents EXE, an effective bug-finding tool that automatically generates inputs that crash real code. Instead of running code on manually or randomly constructed input,...
Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, ...