This paper describes some of the concurrency control 1” lgorithms used in RdMVMS RdbIVMS uses the ,fac.ilities provided by the VMS lock manager in order to perform locking among...
Interactive visualization of massive models still remains a challenging problem. This is mainly due to a combination of ever increasing model complexity with the current hardware ...
—We consider opportunistic spectrum access (OSA) strategies for a transmitter in a multichannel wireless system, where a channel may or may not be available and the transmitter m...
Code cloning is widely recognized as a threat to the maintainability of source code. As such, many clone detection and removal strategies have been proposed. However, some clones ...
(limit 250 words) Purpose This paper reports and describes the use of MediaWiki and Google Docs at undergraduate level as online collaboration tools for co-constructing knowledge i...