Sciweavers

1040 search results - page 62 / 208
» A Comparative Performance Evaluation of Write Barrier Implem...
Sort
View
CAD
2004
Springer
13 years 9 months ago
ESOLID - a system for exact boundary evaluation
We present a system, ESOLID, that performs exact boundary evaluation of low-degree curved solids in reasonable amounts of time. ESOLID performs accurate Boolean operations using e...
John Keyser, Tim Culver, Mark Foskey, Shankar Kris...
GRID
2005
Springer
14 years 2 months ago
Toward seamless grid data access: design and implementation of GridFTP on .NET
— To date, only Linux-/UNIX-based hosts have been participants in the Grid vision for seamless data access, because the necessary Grid data access protocols have not been impleme...
Jun Feng, Lingling Cui, Glenn S. Wasson, Marty Hum...
DSOM
2000
Springer
14 years 1 months ago
Evaluation of Constrained Mobility for Programmability in Network Management
In recent years, a significant amount of research work has addressed the use of code mobility in network management. In this paper, we introduce first three aspects of code mobilit...
Christos Bohoris, Antonio Liotta, George Pavlou
CN
2008
126views more  CN 2008»
13 years 9 months ago
Design and evaluation of flow handoff signalling for multihomed mobile nodes in wireless overlay networks
With the increasing deployment of wireless overlay networks, a mobile node with a range of network interfaces can be connected to multiple heterogeneous or homogeneous access netw...
Qi Wang, Robert Atkinson, John Dunlop
APSEC
2003
IEEE
14 years 2 months ago
Understanding How the Requirements Are Implemented in Source Code
For software maintenance and evolution, a common problem is to understand how each requirement is implemented in the source code. The basic solution of this problem is to find the...
Wei Zhao, Lu Zhang, Yin Liu, Jing Luo, Jiasu Sun