Sciweavers

231 search results - page 43 / 47
» Adaptive bug isolation
Sort
View
INFOCOM
2007
IEEE
14 years 1 months ago
Packet Loss Characterization in WiFi-Based Long Distance Networks
— Despite the increasing number of WiFi-based Long Distance (WiLD) network deployments, there is a lack of understanding of how WiLD networks perform in practice. In this paper, ...
Anmol Sheth, Sergiu Nedevschi, Rabin K. Patra, Son...
PG
2007
IEEE
14 years 1 months ago
Visualisation of Implicit Algebraic Curves
We describe a new algorithm for the visualisation of implicit algebraic curves, which isolates the singular points, compute the topological degree around these points in order to ...
Lionel Alberti, Bernard Mourrain
IWMM
2007
Springer
110views Hardware» more  IWMM 2007»
14 years 1 months ago
Path: page access tracking to improve memory management
Traditionally, operating systems use a coarse approximation of memory accesses to implement memory management algorithms by monitoring page faults or scanning page table entries. ...
Reza Azimi, Livio Soares, Michael Stumm, Thomas Wa...
OTM
2007
Springer
14 years 1 months ago
A Multi-party Rational Exchange Protocol
In recent years, existing computing schemes and paradigms have evolved towards more flexible, ad-hoc scalable frameworks. Nowadays, exchanging interactions between entities often ...
Almudena Alcaide, Juan M. Estévez-Tapiador,...
KBSE
2005
IEEE
14 years 1 months ago
Testing in resource constrained execution environments
Software for resource constrained embedded devices is often implemented in the Java programming language because the Java compiler and virtual machine provide enhanced safety, por...
Gregory M. Kapfhammer, Mary Lou Soffa, Daniel Moss...