default search action
37th ACM Southeast Regional Conference 1999: Mobile, AL, USA
- Proceedings of the 37th Annual ACM Southeast Regional Conference, April 15-18, 1999, Mobile, AL, USA. ACM 1999, ISBN 1-58113-128-3
- Ray Giguette, Johnette Hassell:
Toward a resourceful method of software fault tolerance. - William A. Ward, B. Venkataraman:
Some observations on software quality. - Sathish S. Vadhiyar, Harold C. Grossman:
Static assignment of multithreaded systems. - Tai-Chi Lee, Patrick Robinson, Michael Gubody, Erik Henne:
Software/hardware co-design implementation for fractal image compression. - Andrew Pieter Van Pernis:
Surface construction from within a virtual environment. - Aung Koko Htay, Charles F. Bryan:
Design and implementation of a supervisory software for intelligent robot. - Carmen Musatescu, Dumitru Dan Burdescu, Daniela Marghitu, Ileana Hamburg:
Cooperative work with an intranet communication toolkit. - Tao Tao, Robert M. Hyatt:
Web-based distributed MIS application in health care. - Sharon N. Vest, Janet J. Kemp:
The retention of women in the computing sciences. - Edward Doyle:
CORBA wrap interface. - Quranna Khan, D. Scott McCrickard, Sherian Clay:
Supporting classroom information management with SCOUT. - Kenneth C. Messa, Bogdan D. Czejdo:
Visual software development using an object-relationship model. - Karl S. Mathias, James H. Cross II, T. Dean Hendrix, Larry A. Barowski:
The role of software measures and metrics in studies of program comprehension. - Don Lance, Roland H. Untch, Nancy J. Wahl:
Bytecode-based Java program analysis. - Usha Chandra, Jinyu Shi, Namas Chandra:
Design and implementation of IBIDS - an Internet based integrated design system. - Anatoli Gorchetchnikov:
Memory model with unsupervised sequential learning: the effect of threshold self-adjustment. - Lara A. Francis:
Dualing cubes. - Hongjian Niu, Young Park:
An execution-based retrieval of object-oriented components. - David L. McReynolds, Sheryl Duggins, Doreen L. Galli, John H. Mayer:
Distributed characteristics of subject oriented programming: an evaluation with the process and object paradigms. - Hikyoo Koh:
Applications of restrictive cutsets and topological CROSS's for minimum total load. - K. Balakrishnan, T. Green:
Studying the transient congestion problem in ATM networks. - Steve Donaldson:
Predictive learning and cognitive momentum: a foundation for intelligent, autonomous systems. - Brian Ensink, Kimberly Haveman, Mochan Shrestha, Todd Schavey:
XML based adaptation of the composite approach for database integration. - Mitchell H. Clifton:
Logical conditional instructions. - Sri Krishnaprasad:
Effect of problem structure and data dynamics on efficiency of computations. - David Balsley, George Dickinson, Amber Hinkle, Pamela J. Vermeer:
Replicating computational experiments using simulation systems. - Jim Harris:
Programming a universal push-down automaton. - Nathan Madrid:
Implementing search strategies for grammar interpreters. - Clyde Matthews:
Using formal grammars to encode expert problem solving knowledge. - Yongheng Duan, Marion G. Harmon:
Specifying timing constraints for real-time tasks using the HECTOR run-time environment. - Christine R. Leverenz, Miroslaw Truszczynski:
The rectilinear Steiner tree problem: algorithms and examples using permutations of the terminal set. - Raghavendra Angadi:
Heuristics for jumping pegs problem. - Jing Ren:
Towards a smooth scattered data reconstruction with sharp features. - Cameron Keith Tabor:
Parallelizing the process of rendering 3D animations on the Internet using JAVA. - Panagiotis K. Linos, Michael Breen:
Improving bipartite graphs using multi-strategy simulated annealing. - Thomas F. Hain:
Fast termination criterion for recursive subdivision of Bézier curves. - Chun-Yu Chen, Richard Chapman, Kai H. Chang:
Test scenario and regression test suite generation from Object-Z formal specification for object-oriented program testing. - Jonathan D. Fouss, Kai H. Chang:
Issues of current CSCW systems and possible solutions. - Young Park:
Organizing and retrieving class components based on types for reuse. - David D. Langan:
Heal ourselves: a design and prototype for an educational materials information system. - Robert P. Cook:
An introduction to Phoenix, a teaching operating system. - Ugonna Ibeanusi, Valerie Lafond-Favieres, Latresa McLawhorn, Scott D. Anderson:
Understanding robot navigation and control. - Alan P. Sprague:
NP-completeness of the domatic number problem on circular arc graphs. - Jonathan M. Graham, Cheryl V. Hinds:
Optimal placement of distributed interrelated data components using genetic algorithms. - Jeff Zadeh:
Cryptography on the Internet. - Chuanxue Bi, Nenad Jukic:
A security paradigm for Web databases. - Qiongsen Yu, Barrett R. Bryant:
Effectively locating information on the Internet. - Geof Goldbogen:
A generalization of the GOURD model of human-computer interaction. - Aubrey E. Hill, Warren T. Jones:
Retrospective case base browsing: a data mining process enhancement. - John Drake:
Software integration techniques for modular cognitive modeling systems.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.