Sciweavers

279 search results - page 47 / 56
» 20 Years of ECM
Sort
View
GPCE
2004
Springer
14 years 22 days ago
Taming Macros
Scheme includes a simple yet powerful macro mechanism. Using macros, programmers can easily extend the language with new kinds of expressions and definitions, thus abstracting ove...
Ryan Culpepper, Matthias Felleisen
IUI
2003
ACM
14 years 18 days ago
Evolution of user interaction: the case of agent adele
Animated pedagogical agents offer promise as a means of making computer-aided learning more engaging and effective. To achieve this, an agent must be able to interact with the lea...
W. Lewis Johnson, Erin Shaw, Andrew Marshall, Cath...
MOBICOM
2003
ACM
14 years 18 days ago
Enhancing TCP fairness in ad hoc wireless networks using neighborhood RED
Significant TCP unfairness in ad hoc wireless networks has been reported during the past several years. This unfairness results from the nature of the shared wireless medium and ...
Kaixin Xu, Mario Gerla, Lantao Qi, Yantai Shu
SIGMETRICS
2003
ACM
136views Hardware» more  SIGMETRICS 2003»
14 years 18 days ago
Internet intrusions: global characteristics and prevalence
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the glob...
Vinod Yegneswaran, Paul Barford, Johannes Ullrich
BIRTHDAY
2003
Springer
14 years 18 days ago
Extreme Model Checking
One of the central axioms of extreme programming is the disciplined use of regression testing during stepwise software development. Due to recent progress in software model checkin...
Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar,...