Sciweavers

10792 search results - page 2069 / 2159
» An Evaluation of Non-Equijoin Algorithms
Sort
View
CASES
2006
ACM
14 years 4 months ago
Automated compile-time and run-time techniques to increase usable memory in MMU-less embedded systems
Random access memory (RAM) is tightly-constrained in many embedded systems. This is especially true for the least expensive, lowest-power embedded systems, such as sensor network ...
Lan S. Bai, Lei Yang, Robert P. Dick
CONEXT
2006
ACM
14 years 4 months ago
Mobile agents based framework for routing and congestion control in mobile ad hoc networks
In this paper, we present a Mobile Agents based Framework for Routing and Congestion control in Mobile Ad Hoc Networks (MAFRC). The framework uses a cross-layer design approach wh...
H. M. P. Shekhar, K. S. Ramanatha
DAC
2006
ACM
14 years 4 months ago
Signature-based workload estimation for mobile 3D graphics
Until recently, most 3D graphics applications had been regarded as too computationally intensive for devices other than desktop computers and gaming consoles. This notion is rapid...
Bren Mochocki, Kanishka Lahiri, Srihari Cadambi, X...
DOCENG
2006
ACM
14 years 4 months ago
Content based SMS spam filtering
In the recent years, we have witnessed a dramatic increment in the volume of spam email. Other related forms of spam are increasingly revealing as a problem of importance, special...
José María Gómez Hidalgo, Gui...
ECLIPSE
2006
ACM
14 years 4 months ago
HAM: cross-cutting concerns in Eclipse
As programs evolve, newly added functionality sometimes no longer aligns with the original design, ending up scattered across the software system. Aspect mining tries to identify ...
Silvia Breu, Thomas Zimmermann, Christian Lindig
« Prev « First page 2069 / 2159 Last » Next »