Sciweavers

587 search results - page 104 / 118
» A Formal Framework for Developing Adaptable Service-Based Ap...
Sort
View
CN
2006
79views more  CN 2006»
13 years 8 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
SPLC
2010
13 years 7 months ago
Stratified Analytic Hierarchy Process: Prioritization and Selection of Software Features
Product line engineering allows for the rapid development of variants of a domain specific application by using a common set of reusable assets often known as core assets. Variabil...
Ebrahim Bagheri, Mohsen Asadi, Dragan Gasevic, Sam...
SIGSOFT
2007
ACM
14 years 9 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
NDJFL
2000
79views more  NDJFL 2000»
13 years 8 months ago
An Information-Based Theory of Conditionals
We present an approach to combining three areas of research which we claim are all based on information theory: knowledge representation in Artificial Intelligence and Cognitive Sc...
Wayne Wobcke
ASPLOS
2008
ACM
13 years 10 months ago
Streamware: programming general-purpose multicore processors using streams
Recently, the number of cores on general-purpose processors has been increasing rapidly. Using conventional programming models, it is challenging to effectively exploit these core...
Jayanth Gummaraju, Joel Coburn, Yoshio Turner, Men...