Sciweavers

631 search results - page 65 / 127
» An experimental evaluation of continuous testing during deve...
Sort
View
NCA
2003
IEEE
14 years 1 months ago
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense
Attacks against distributed systems frequently start at the network layer by gathering network related information (such as open TCP ports) and continue on by exhausting resources...
Michael Atighetchi, Partha Pratim Pal, Franklin We...
SIGCOMM
2010
ACM
13 years 8 months ago
Vehicular wifi access and rate adaptation
Abstract--Vehicular WiFi access is distinct in two respects, (i) continuous mobility of clients and (ii) possibility of predictable link quality. As part of this study, we aim to c...
Ajinkya Uday Joshi, Purushottam Kulkarni
GECCO
2007
Springer
168views Optimization» more  GECCO 2007»
14 years 2 months ago
Sex and death: towards biologically inspired heuristics for constraint handling
Constrained continuous optimization is still an interesting field of research. Many heuristics have been proposed in the last decade. Most of them are based on penalty functions....
Oliver Kramer, Stephan Brügger, Dejan Lazovic
SIGMOD
2003
ACM
193views Database» more  SIGMOD 2003»
14 years 8 months ago
Chain : Operator Scheduling for Memory Minimization in Data Stream Systems
In many applications involving continuous data streams, data arrival is bursty and data rate fluctuates over time. Systems that seek to give rapid or real-time query responses in ...
Brian Babcock, Shivnath Babu, Mayur Datar, Rajeev ...
CLUSTER
2003
IEEE
14 years 1 months ago
HPCM: A Pre-Compiler Aided Middleware for the Mobility of Legacy Code
Mobility is a fundamental functionality of the next generation internet computing. How to support mobility for legacy codes, however, is still an issue of research. The key to sol...
Cong Du, Xian-He Sun, Kasidit Chanchio